The Intent to Compromise: Bypassing Firewalls and Cloud Security Vendors

Today’s technology professional needs a detection system that not only blocks any indicator if their site is compromised, but also one that blocks access to malware downloads, and prevents phishing attacks. What if your system could also identify threats while in the planning stage? This is the zone where lookalike detection comes in, and it can proactively prevent attacks before they are even launched.


This webinar taught how threat hunting in DNS helps your organization identify new C2 domains and persistent threats before other security solutions.


Learning Objectives included to help prevent and detect:

  • Data exfiltration using behavioral models
  • Domain Generation Algorithms (DGAs) using analytics
  • Adversary infrastructure and review suspicious activity early in the threat lifecycle

Speaker and Presenter Information

Ryan Ettl

SLED Infoblox Product Security Specialist

Relevant Government Agencies

Other Federal Agencies, Federal Government, State & Local Government



Event Type
On-Demand Webcast

This event has no exhibitor/sponsor opportunities

Complimentary:    $ 0.00

Click here to visit event website

Event Sponsors

Infoblox, International Data Link Inc.

Infoblox Government Team at Carahsoft

Contact Event Organizer

Return to search results