Identifying and Mitigating DDoS Attacks
Our panel explains why DDoS attacks continue to be a challenge for enterprises.
![Fishing hooks in caught in email accounts in a digital tunnel. 3D illustration of the concept of email phishing and online security. Fishing hooks in caught in email accounts in a digital tunnel. 3D illustration of the concept of email phishing and online security.](https://eu-images.contentstack.com/v3/assets/blt69509c9116440be8/blt2b1970ebdae345f3/6650a72de9a02dab12253340/Email_Phishing_Dragon_Claws_via_Alamy_Stock.jpg?width=850&auto=webp&quality=95&format=jpg&disable=upscale)
In this archived panel discussion, experts from various sectors shared effective strategies for responding to DDoS attacks. Panelists include Cassandra Mack, head of security and GRC, and CISO at Spekit; Cory Wolff, director of offensive security at risk3sixty; Nia Luckey, senior cybersecurity business consultant at Infosys; and Steven Hill, independent analyst, data center technologies, for ToneCurve Technology, LLC.
The session highlighted the severe impact downtime can have on modern enterprises, especially when subjected to repeated attacks. The panelists explored the pros and cons of different DDoS response options, what you can do to prepare for inevitable attacks, and how to quickly bounce back.
This segment was part of our live virtual event, “Cyber Resilience in 2024: Availability Is Your Best Ability,” presented by ITPro Today and InformationWeek on May 2, 2024.
About the Author(s)
You May Also Like
The CIOs Guide to Enhancing GRC in 2024
June 20, 2024Enhance Cloud Security with Cloud-Native Security
June 25, 2024Search Capabilities with PostgreSQL: From Standard to Semantic
June 27, 2024