The Intent to Compromise: Bypassing Firewalls and Cloud Security Vendors


This event qualifies for 1 CPEs


Today’s technology professional needs a detection system that not only blocks any indicator if their site is compromised, but also one that blocks access to malware downloads, and prevents phishing attacks. What if your system could also identify threats while in the planning stage? This is the zone where lookalike detection comes in, and it can proactively prevent attacks before they are even launched.

 

Join Infoblox and IDL on May 8th to learn how threat hunting in DNS helps your organization identify new C2 domains and persistent threats before other security solutions.

 

Learning Objectives to help prevent and detect:

  • Data exfiltration using behavioral models
  • Domain Generation Algorithms (DGAs) using analytics
  • Adversary infrastructure and review suspicious activity early in the threat lifecycle

Speaker and Presenter Information

Ryan Ettl

SLED Infoblox Product Security Specialist

Relevant Government Agencies

Other Federal Agencies, Federal Government, State & Local Government


Register as Attendee


Add to Calendar


Event Type
Webcast


This event has no exhibitor/sponsor opportunities


When
Wed, May 8, 2024, 1:00pm - 2:00pm ET


Cost
Complimentary:    $ 0.00


Website
Click here to visit event website


Event Sponsors

Infoblox, International Data Link Inc.


Organizer
Infoblox Government Team at Carahsoft


Contact Event Organizer



Return to search results