The Intent to Compromise: Bypassing Firewalls and Cloud Security Vendors
Today’s technology professional needs a detection system that not only blocks any indicator if their site is compromised, but also one that blocks access to malware downloads, and prevents phishing attacks. What if your system could also identify threats while in the planning stage? This is the zone where lookalike detection comes in, and it can proactively prevent attacks before they are even launched.
This webinar taught how threat hunting in DNS helps your organization identify new C2 domains and persistent threats before other security solutions.
Learning Objectives included to help prevent and detect:
- Data exfiltration using behavioral models
- Domain Generation Algorithms (DGAs) using analytics
- Adversary infrastructure and review suspicious activity early in the threat lifecycle
Speaker and Presenter Information
Ryan Ettl
SLED Infoblox Product Security Specialist
Relevant Government Agencies
Other Federal Agencies, Federal Government, State & Local Government
Event Type
On-Demand Webcast
This event has no exhibitor/sponsor opportunities
Cost
Complimentary: $ 0.00
Website
Click here to visit event website
Event Sponsors
Organizer
Infoblox Government Team at Carahsoft