Securing Your System Against the Next DDoS Attack

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log in
Sign up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.

Your password should:

  • be at least eight characters long
  • be no more than 25 characters long
  • contain at least one uppercase, lowercase and special character
  • contain at least one digit
  • only contain alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

In a recent survey, less than a quarter (24%) of cybersecurity professionals said they were ‘very confident’ in their organization’s knowledge of how to respond to an RDDoS attack. Indeed, despite large investments in DDoS protection solutions, many attacks still succeed in bringing down systems and causing outages, leading to huge disruption and costs to businesses.

Join expert panelists in an interactive discussion on how to better prepare and maximize protection against DDoS attacks, including when they are part of ransomware, and ensure that your site remains protected even in the event of an attack.

Join this session to learn:

  • The latest trends and tactics around DDoS attacks
  • How to maximize the use of DDoS attack simulation
  • Improve DDoS protection best practices


Photo of James Coker

James Coker

Deputy Editor, Infosecurity Magazine

Photo of Professor Kevin  Curran

Professor Kevin Curran

Senior IEEE Member and Professor of Cybersecurity, Ulster University.

Photo of Ziv Gadot

Ziv Gadot

CEO, Red Button

Photo of Dominic Grunden

Dominic Grunden

CISO for UnionDigital Bank and ClubCISO Member

Brought to you by

Should you watch this webinar your information may be shared with the sponsors indicated above. Please see the privacy policy for Red Button here: Please see Infosecurity Magazine’s privacy policy for more information.