How to Design and Operate a DDOS Testing Program

Closed captioning will be available in English and Japanese for all keynotes and RSAC track sessions.
Please note: All times are in SGT.
  1. Moscone West

Despite investment in DDoS mitigation, testing solutions is seldom on the agenda of most vulnerability management programs that focus on vulnerability scanning and pen testing. This three-hour lab will deliver an effective approach to validate your defenses against all forms of DDoS including the ability to simulate attacks, measure your response and determine if your operational practices are working.

Learning Objectives:
1: Characterize environment. Threat modelling, target identification, attack vector selection. Cloud and on-prem.
2: Test execution. Simulate all forms of DDoS attacks, set metrics and thresholds, observe operational response.
3: Improvements. Simple, no-cost or low-cost measures to rapidly build resilience and RoI on existing technology.

Download pdf