- CISO Series Newsletter
- Posts
- Join us tomorrow for Hacking DDoS
Join us tomorrow for Hacking DDoS
Join us tomorrow for Hacking DDoS
Join us TOMORROW, Friday [01-21-22], for "Hacking Distributed Denial of Service (DDoS)"
Our discussion will be
"Hacking Distributed Denial of Service (DDoS): An hour of critical thinking about how to predict, manage, and thwart massive traffic attacks."
It all begins at 10 AM PT/1 PM ET on Friday, January 21, 2022 with guests Matthew Andriani, founder and CEO, MazeBolt, and Chris Grundemann research category lead (networking and security), GigaOm. We'll have fun conversation and games, plus at the end of the hour (11 AM PT/2 PM ET) we'll do our meetup.
Thanks to our video chat sponsor, Mazebolt
Defense in Depth
DDoS Solutions
On this week's Defense in Depth, Geoff Belknap, CISO, LinkedIn, and I welcome guest Alastair Cooke, analyst, GigaOm. Here are a few of the highlights of our discussion:
Where should a DDoS solution reside?
What vital elements should go into a DDoS solution?
Do we need more automation and intelligence in these solutions?
How involved should the customer be with their DDoS solution?
Thanks to our podcast sponsor, MazeBolt
Overheard on Defense in Depth
“There are hundreds and thousands of vulnerabilities out there, zero days, zero minus one days, that we haven't even discovered yet. In essence, vulnerability management is a sisyphean task and that's why the teams get burned out on it.” - Jason Elrod, CISO, MultiCare Health System
Listen to full episode of "
."
Cyber Security Headlines - Week in Review
We're live tomorrow and every Friday at 12:30 PM PT/3:30 PM ET for a short 20-minute discussion of the week's cyber news. Here are a few of the stories we'll be discussing on the show:
Microsoft discloses malware attack on Ukraine government networks
DHL now the phishing king
Hackers can grab stolen credentials using VirusTotal
You can participate live in the conversation by registering on
.
or subscribe to the daily newsletter.
Thanks to this week's headlines sponsor, Datadog
Overheard on CISO/Security Vendor Relationship Podcast
“Everybody is responsible for an attack surface. They’re responsible for the assets that are in the corporate environment. And by taking responsibility and knowing that you’re responsible you’re going to do more than just good asset management or more than just good vulnerability management, you’re going to do good risk management for the enterprise.” - Jim Wachhaus, risk intelligence evangelist, CyCognito
Listen to full episode of "
."