IPXO Webinar: Cyber Threat Mitigation
Автор: IPXO
Загружено: 2022-04-20
Просмотров: 171
#Webinar #cybersecurity #internet #cybersecurity #ddos #internetsecurity
◎◎◎ About the Webinar ◎◎◎
To better develop tools and tactics to mitigate a broad range of cyber threats, we first need to understand what is going on out there.
Observing and analyzing the Internet landscape, the incidents that are taking place, and what failures allowed these incidents to take place at all, gives us the intelligence to develop ways to better mitigate them. But how do we move from abuse observability and intelligence ultimately to abuse prevention?
We have gathered several industry experts to share their thoughts and experiences on how they are contributing to a better understanding of this space.
Zoltan Balazs, Head of Vulnerability Research Lab at CUJO AI, shared that cybersecurity researchers are currently observing a significant increase in scams related to blockchain and cryptocurrency, both of which are still highly sensation and clickbaity topics.
When asked about the effectiveness of blocklists during the Cyber Threat Mitigation webinar, Andrius Lapienė, the Staff Security Engineer at IPXO, shared that blocklists should not be used to prevent threats but rather help indicate them so that further mitigation steps could be taken.
“When you have a lot of IP addresses and different customers...and some IP addresses start spawning in blocklists, that is a very good indicator that your customer is probably doing something that he or she should not be doing. "
Virgil Truica, DDoS Security Evangelist at Voxility, believes that appropriate KYC practices can help make informed risk assessments and, simultaneously, lower these risks. In a recent IPXO webinar, Truica shared that proper KYC practices helped lower the risk of network security breaches, the number of abuse-related issues and even the number of support tickets at Voxility. This provided the teams with more time to scale:
“This provided our engineers with spare time to focus on improving the current services...Trustworthy customers provide financial stability for long-term honesty and transparency. "
▷ Watch the webinar recording to get more detailed insights on the topic.
Moderator:
✦ Paul Rendek | LinkedIn - / paul-rendek-100540
Guests:
✦ Zoltan Balazs | LinkedIn - / zbalazs
✦ Thomas Johnson | LinkedIn - / flytj
✦ Virgil Truica | LinkedIn - / virgiltruica
✦ Andrius Lapiene| LinkedIn - / andriuslapiene
◎◎◎ Read more ◎◎◎
✓ No one can fully protect their network against abuse. If it’s on the internet – you can break it. The main point is not to avoid it entirely, but to react to it as quickly and effectively as possible. According to Laura, we have to answer two main questions: how can the service I’m providing be used to hurt people, and how could this be utilized in a way that could be harmful to society as a whole? The answers will help us set our business compliance and legal boundaries.
➭ https://www.ipxo.com/blog/abuse-desk-...
◎◎◎ About IPXO ◎◎◎
Learn more about IP Lease and Monetization @ https://ipxo.com
At IPXO, we provide full-cycle IP management, functional IP lease and monetization ecosystem, top-grade abuse control to ensure IP reputation, and an IP automation stack that actually works.
◎◎◎ Contact us ◎◎◎
► Send us an e-mail @ [email protected]
► Book a session with our customer success team:
https://calendly.com/ipxo/30min-1
◎◎◎ Join us on other platforms ◎◎◎
◦ LinkedIn | / ipxo
◦ Twitter | / ipxocom
◦ AngelList | https://angel.co/company/ipxo
◎◎◎ Get notified about our future webinars ◎◎◎
► https://www.bigmarker.com/communities...
◎◎◎ Subscribe to our Blog ◎◎◎
► https://ipxo.com/blog
◎◎◎ Credits ◎◎◎
🎵 Music: Bendsound - Creative Minds
IPXO, 2022
April 14
0:00 - 2:50 - Introduction
2:51 - 7:02 - What is the current cyber threat landscape like and how is it changing?
7:03 - 12:33 - What are the current cyber security threats and how can they be mitigated? 12:34 - 15:33 - Could cybersecurity be regulated on a governmental level?
15:34 - 20:55 - Is cyber threat prevention better than a cure?
20:56 - 23:16 - Are free antiviruses a method of reliable protection against cyber threats? 23:20 - 28:50 - Do blacklists act as a reliable cyber threat prevention method?
28:51 - 35:37 - What are the main resources of information for cyber threat intelligence gathering?
35:38 - 38:27 - Is my personal information safe on social media?
38:28 – 59:31 - Is cooperation the next step for better cyber threat mitigation?
59:32 – 59:36 - Closing remarks
Доступные форматы для скачивания:
Скачать видео mp4
-
Информация по загрузке: