4 years ago 4,801 views
4 years ago 4,801 views
Presented by Chris Holland
April 3, 2020
October 2016's attack on Dyn's DNS infrastructure was a gloomy wake-up call to the online community at-large, depriving us access to some of the online destinations and applications we use every day, thereby confronting us with the stark reality of an old and ever-growing threat with which the InfoSec community has been grappling: DDoS Attacks.
As we look at the role that 'Internet of Things' devices played in the attack against Dyn, as well as the attack against Krebs prior to it, we will dive into the DDoS attacks Threat Landscape: Symptoms, Motivations, Business Impact & Attack Vectors. Having thereby gained a better understanding of our exposure to these threats, we'll then explore Defensive Countermeasures with a strong emphasis on preparedness ahead of these attacks, including:
Reducing Attack Surface
* Monitoring: Availability, Performance & Search Engine Visibility
* DNS Redundancy Planning
* Web Application Scaling Strategies
* Mitigation Vendor Fit Assessment
* Attack Mitigation
Attendees should walk out of this presentation with:
* A better understanding of what DDoS attacks are and how they work.
* A better understanding of their exposure to such attacks.
* A set of concrete steps to better prepare ahead of an attack for more effective mitigation.
About Chris
Chris Holland leads a small Software Engineering Team at an HR company. Throughout a career spanning more than 20 years, Chris has held Sr. Engineering and Leadership roles for small and large successful publicly-traded companies such as EarthLink and Internet Brands, serving business models across Content, Commerce, Travel & Finance on a wide variety of technology stacks including PHP/LAMP, Java/J2EE and C#/.Net, catering to audiences over 100 million monthly visitors. Chris is also a contributor to NomadPHP and php[architect] magazine, and has been published in CIOReview.