Securing Your System Against the Next DDoS Attack

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log In

Sign Up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.

Your password should:

  • be at least eight characters long
  • be no more than 25 characters long
  • contain at least one uppercase, lowercase and special character
  • contain at least one digit
  • only contain alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

In a recent survey, less than a quarter (24%) of cybersecurity professionals said they were ‘very confident’ in their organization’s knowledge of how to respond to an RDDoS attack. Indeed, despite large investments in DDoS protection solutions, many attacks still succeed in bringing down systems and causing outages, leading to huge disruption and costs to businesses.

Join expert panelists in an interactive discussion on how to better prepare and maximize protection against DDoS attacks, including when they are part of ransomware, and ensure that your site remains protected even in the event of an attack.

Join this session to learn:

  • The latest trends and tactics around DDoS attacks
  • How to maximize the use of DDoS attack simulation
  • Improve DDoS protection best practices


James Coker

Deputy Editor, Infosecurity Magazine

Professor Kevin  Curran

Senior IEEE Member and Professor of Cybersecurity, Ulster University.

Ziv Gadot

Founder and CEO, Red Button

    Dominic Grunden

    CISO for UnionDigital Bank and ClubCISO Member

      Brought to You by

      Should you register for this event your information will be shared with the sponsor indicated above. Please see Red Button's privacy policy here: Please see Infosecurity Magazine’s privacy policy for additional information.