<img src="https://certify.alexametrics.com/atrk.gif?account=8w5fq1Fx9f207i" style="display:none" height="1" width="1" alt="">
There’s an OpenBullet Attack Config for Your Site – What Should You Do?

Webinar

Think About Your Audience Before Choosing a Webinar Title

Sponsored by CEQUENCE SECURITY


Wednesday, July 22, 2020
1 pm EDT
 
Using commercially available attack tools like OpenBullet, Snipr MBA and BlackBullet has dramatically simplified the act of committing fraud through account takeovers, fake account creation or other automated attack. With thousands of configs available on the web, bad actors can find a pre-defined attacks for the retail, financial services, streaming media or other web application they want to target. If a predefined attack config for your company is discovered, how should you react?

In this session, Will Glazier, head of security research at Cequence Security will provide tips and techniques to help you uncover the existence of an attack config, then demonstrate how it is used in OpenBullet, providing pointers on how to use OpenBullet to your mitigation advantage. A demonstration of Cequence Bot Defense will wrap up the session. Discussion topics for the talk will include:

  • Researching Attack Configurations
     - Forums
     - Attack tools
     - Using the power of Google
  • Turning the Tables: OpenBullet Deep Dive
     - How it works
     - Use it to your advantage: stop the attacks
  • Using OpenBullet Findings to Prevent Attacks
    - Brief demo of Cequence Bot Defense
Will Glazier
Head of CQ Prime Threat Research and Data Science - Cequence
Glazier is the Cequence Security’s Head of CQ Prime Threat Research Team, whose mission is to help the security industry better understand how cybercriminals execute automated, malicious bot attacks against web, mobile, and API-based applications. Glazier focuses on the rapidly escalating problems of account takeover, fake account creation and content scraping at scale. He has an extensive background in fraud and abuse prevention, as well as building threat intelligence systems and databases.

On-Demand Viewing:

What You’ll Learn in This Webinar

You’ve probably written a hundred abstracts in your day, but have you come up with a template that really seems to resonate? Go back through your past webinar inventory and see what events produced the most registrants. Sure – this will vary by topic but what got their attention initially was the description you wrote.

Paint a mental image of the benefits of attending your webinar. Often times this can be summarized in the title of your event. Your prospects may not even make it to the body of the message, so get your point across immediately.  Capture their attention, pique their interest, and push them towards the desired action (i.e. signing up for your event). You have to make them focus and you have to do it fast. Using an active voice and bullet points is great way to do this.

Always add key takeaways. Something like this....In this session, you’ll learn about:

  • You know you’ve cringed at misspellings and improper grammar before, so don’t get caught making the same mistake.
  • Get a second or even third set of eyes to review your work.
  • It reflects on your professionalism even if it has nothing to do with your event.