The Best Online Cybersecurity Training in the World - SANS OnDemand


To attend this webcast, login to your SANS Account or create your Account.

4 Techniques to Modernize Your DDoS Defenses

  • Tuesday, July 24th, 2018 at 3:30 PM EDT (19:30:00 UTC)
  • Donald Shin and John Pescatore
This webcast has been archived. You can view the webcast presentation and download the slides by logging into your SANS Portal Account or creating an Account. Click the Register Now button after you have logged in to view the Webcast.


  • A10 Networks

You can now attend the webcast using your mobile device!


DDoS attacker have evolved by weaponizing IoT devices. However, defenders continue to depend on technologies developed in the 2000s that lack the precision, scalability or automation needed to fight in the current cyber battlefield.

Join us on this webinar with John Pescatore and Don Shin, Security Advocate at A10 Networks, to learn the techniques you must incorporate into your security strategy to prepare for the next wave of multi-vector DDoS attacks.

In this webinar you will learn how to:

  •    Minimize collateral damage from false positives and negatives
  •    Automate responses to multi-vector attacks
  •    Leverage threat intelligence for your defense
  •    Choose the right architecture to meet your business objectives

Speaker Bios

Don Shin

Don Shin is Senior Product Marketing Manager at A10 Networks. Don is a highly experienced security technology product marketer, with more than 15 years of experience in Networking and Security industries. Prior to A10, Don work in a variety of roles in R&D, product management, and marketing focused on network security, security efficacy testing, semiconductors and Cloud security. He is passionate about helping customers improve their security posture and speaks frequently at security conferences.

John Pescatore

John Pescatore joined SANS as director of emerging security trends in January 2013 after more than 13 years as lead security analyst for Gartner, running consulting groups at Trusted Information Systems and Entrust, 11 years with GTE, and service with both the National Security Agency, where he designed secure voice systems, and the U.S. Secret Service, where he developed secure communications and surveillance systems and "the occasional ballistic armor installation." John has testified before Congress about cybersecurity, was named one of the 15 most-influential people in security in 2008 and is an NSA-certified cryptologic engineer.

Need Help? Visit our FAQ page or email

Not able to attend a SANS webcast? All Webcasts are archived so you may view and listen at a time convenient to your schedule. View our webcast archive and access webcast recordings/PDF slides.