Attack Vectors

Discover the latest collection of talks and videos on Attack Vectors from industry experts.

Attend Summits on Attack Vectors

Cybersecurity

Cybersecurity

Every year Cybersecurity threats challenge businesses and governments around the world to protect mission critical infrastructure and data. To remain
effective in the Cybersecurity industry organizations have to stay a step ahead of sophisticated cyber criminals and emerging attack vectors by innovating a…

|5 sessions
The Next Decade of DDoS Defense

The Next Decade of DDoS Defense

Innovation in DDoS attack targets and techniques show no sign of slowing. Attackers today are launching sophisticated multi-vector attacks, targeting key
applications and infrastructure. They continue to leverage the reflection amplification capabilities of DNS, NTP and other vulnerable protocols to launch ver…

|3 sessions
Application and Mobile Security

Application and Mobile Security

The last 12 months have been a definitive period in application security. From Snapchat to Spotify, we have seen attackers increasingly targeting applications
as user data jackpots. Android and iOS are continuing to be vectors for attacks as hackers breakthrough one vulnerability after another. In this summit, ind…

|24 sessions
ISCN Application and Mobile Security

ISCN Application and Mobile Security

The last 12 months have been a definitive period in application security. From Snapchat to Spotify, we have seen attackers increasingly targeting applications
as user data jackpots. Android and iOS are continuing to be vectors for attacks as hackers breakthrough one vulnerability after another. In this summit, ind…

|8 sessions
Email Security and Compliance

Email Security and Compliance

As email persists as a critical business application used to share confidential information, it is becoming a top vector for malicious attacks and security
breaches. With its growing importance and various end points through which to access it, how do you eliminate vulnerabilities to ensure that emails are sec…

|7 sessions