The Intent to Compromise: Bypassing Firewalls and Cloud Security Vendors



Today’s technology professional needs a detection system that not only blocks any indicator if their site is compromised, but also one that blocks access to malware downloads, and prevents phishing attacks. What if your system could also identify threats while in the planning stage? This is the zone where lookalike detection comes in, and it can proactively prevent attacks before they are even launched.

 

This webinar taught how threat hunting in DNS helps your organization identify new C2 domains and persistent threats before other security solutions.

 

Learning Objectives included to help prevent and detect:

  • Data exfiltration using behavioral models
  • Domain Generation Algorithms (DGAs) using analytics
  • Adversary infrastructure and review suspicious activity early in the threat lifecycle

Speaker and Presenter Information

Ryan Ettl

SLED Infoblox Product Security Specialist

Relevant Government Agencies

Other Federal Agencies, Federal Government, State & Local Government


Register


Register


Event Type
On-Demand Webcast


This event has no exhibitor/sponsor opportunities


Cost
Complimentary:    $ 0.00


Website
Click here to visit event website


Event Sponsors

Infoblox, International Data Link Inc.


Organizer
Infoblox Government Team at Carahsoft


Contact Event Organizer



Return to search results