The Anatomy of an Attack: Live Webinar

Have you ever wondered how some of the most prevalent web application attacks are actually executed in real life?  Join us on Thursday, April 28 @ 10:00 Pacific as F5's security expert David Holmes will walk through the methodology used by some of the most successful attacks in history.  We will discuss recent and relavent examples of network attacks like the Kate Upton iCloud hack, some of the Anonymous and LulzSec attacks using the TOR network, and even social attacks on CEOs.  

You'll learn about how the attacks take place, but you'll also learn how to stop them!  David will spend about 40 minutes discussing the attacks and mitigation techniques, and then we will have about 20 minutes for answering questions.

 

Here's the link to sign up:  https://interact.f5.com/2016Q3W-Anatomy-of-an-Attack

 

Feel free to use the comment section below for questions.  We will have time at the end of the presentation to address questions that you submit.

Published Apr 25, 2016
Version 1.0

Was this article helpful?

No CommentsBe the first to comment