The Bot Management Review: Separating Bot Fact From Fiction
Wednesday, March 16th 2022 11:12 GMT / 12:12 CET
About this event
Netacea surveyed 440 enterprise businesses in the UK and US and discovered that although businesses know bots are costing them millions of dollars, they share many common misconceptions about these threats.
Can you spot the truth amongst these bot myths?
- ‘DDoS protection and WAFs stop sophisticated bots’
- ‘Most credential stuffing attacks use bots’
- ‘Bots can only be bought from the dark web’
- ‘All bot users are criminals’
We’ve assembled an elite squad of bot myth busters from Netacea and MalwareBytes Labs for a live webinar. Their mission is to get to the bottom of why these myths are so widely believed – and how businesses can move beyond the myths to protect themselves from the most malicious automated threats.
Test your knowledge throughout via interactive polls, plus bring your questions to the live Q&A session at the end.
In this webinar we will:
- Discuss commonly held beliefs about bots from the survey
- Confirm or bust each myth using real-world data
- Examine where these beliefs came from
- Identify how businesses can get ahead of bot attacks
Watch this event
Meet our speakers
- Paulina Cakalli, Lead Data Analyst at Netacea
Paulina works closely with Netacea’s data science and threat research teams to develop new models for detecting anomalous web traffic, combining this with machine learning to produce recommendations for clients. She is co-founder of BSides Tirana, an international security conference.
- Matthew Gracey-McMinn , Head of Threat Research at Netacea
Matthew is an experienced Cybersecurity professional. In his current role he researches and investigates the impact of malicious bots on online businesses and their customers. His articles have been published in Security Magazine, Tech Radar and Security Info Watch.
- Adam Kujawa , Security Evangelist & Director at MalwareBytes Lab
Adam is head of thought leadership for Malwarebytes Labs, with over 17 years of experience fighting malware behind the scenes and on the front lines. Adam has analyzed and reported on threats aimed at businesses, from SMB to enterprises, as well as state-sponsored actors and threats to individual consumers. He has had articles published in SC Magazine, TechCrunch, and other notable tech publications and is frequently quoted on computer security matters by news organizations around the world.