Hi [[ session.user.profile.firstName ]]

Learn to Think Like a Hacker to Stop Attacks Faster

Strengthen Your Security Posture with the MITRE ATT&CK Framework

The MITRE ATT&CK Framework is a comprehensive, up-to-date knowledge base of cyberattacker tactics and techniques gathered from actual observation of attacker behavior.

Watch the webinar and discover how MITRE ATT&CK can help you make better, faster decisions about assessing risks, deploying new security controls and stopping attacks faster and more efficiently.

With the takeaways from this webinar, you will be ideally positioned to:

>Anticipate what an attacker will do next and respond accordingly
>Strengthen your security based on real-world use cases
>Stop intruders in their tracks if and when an attack occurs

Know What to Expect When Attackers Strike
Recorded Dec 13 2019 56 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Mike Zuckerman
Presentation preview: Learn to Think Like a Hacker to Stop Attacks Faster

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • The Role of DDI in SASE Deployments (APAC) Sep 30 2020 1:00 am UTC 60 mins
    Anthony James, VP Product Marketing Infoblox & Zeus Kerravala, Founder & Principal Analyst ZK Research
    The real action on networks today is happening at the edge. Everyone is demanding faster, more reliable access to a growing number of mobile-aware resources, applications and services.

    Attend this webinar and you’ll learn why traditional network architectures are falling short on delivering those services, and how Secure Access Service Edge (or SASE) has emerged as the next phase of distributed enterprise networking. You’ll learn:

    - How SASE brings a fundamental change to the way WANs are deployed and managed

    - Why integrating networking and security services lets you deliver a network that more efficiently powers distributed environments

    - Why a flexible, scalable and cloud-managed DDI (DNS, DHCP, IPAM) foundation is required to deliver highly available, high performance network and security services.

    - How the Infoblox BloxOne Platform utilizes a microservices and container-based architecture to:

    Streamline network operations
    Reduces total cost of ownership
    Expand robust SaaS-based services

    Register now to learn more about how cloud-managed DDI and the Infoblox BloxOne platform can help you deliver applications faster and more efficiently at the edge.
  • Coffee Chat w/ Cricket: Connectivity, Local Survivability & Security at the Edge Sep 29 2020 3:00 pm UTC 60 mins
    Cricket Liu and SriKrupa Srivatsan
    Networks today are more and more distributed. Applications and data no longer only reside in a company’s centralized datacenter or cloud infrastructure. Data now gets generated and consumed outside of centralized datacenters and SaaS adoption has skyrocketed. This is where edge computing and related network and security services (like DDI and DNS security) come into the picture.


    Join us for our upcoming “Coffee Chat with Cricket” to discuss at a high level what the edge is, what’s driving its adoption and how cloud hosted/managed networking and security stacks help provide agility, scale, local survivability and security for the edge. As always, we will also spend a considerable about of time answering questions from the audience.
  • The Role of DDI in SASE Deployments (EMEA) Sep 23 2020 9:00 am UTC 60 mins
    Anthony James, VP Product Marketing Infoblox & Zeus Kerravala, Founder & Principal Analyst ZK Research
    The real action on networks today is happening at the edge. Everyone is demanding faster, more reliable access to a growing number of mobile-aware resources, applications and services.

    Attend this webinar and you’ll learn why traditional network architectures are falling short on delivering those services, and how Secure Access Service Edge (or SASE) has emerged as the next phase of distributed enterprise networking. You’ll learn:

    - How SASE brings a fundamental change to the way WANs are deployed and managed

    - Why integrating networking and security services lets you deliver a network that more efficiently powers distributed environments

    - Why a flexible, scalable and cloud-managed DDI (DNS, DHCP, IPAM) foundation is required to deliver highly available, high performance network and security services.

    - How the Infoblox BloxOne Platform utilizes a microservices and container-based architecture to:

    Streamline network operations
    Reduces total cost of ownership
    Expand robust SaaS-based services

    Register now to learn more about how cloud-managed DDI and the Infoblox BloxOne platform can help you deliver applications faster and more efficiently at the edge.
  • The Role of DDI in SASE Deployments Sep 22 2020 5:00 pm UTC 60 mins
    Anthony James, VP Product Marketing Infoblox & Zeus Kerravala, Founder & Principal Analyst ZK Research
    The real action on networks today is happening at the edge. Everyone is demanding faster, more reliable access to a growing number of mobile-aware resources, applications and services.

    Attend this webinar and you’ll learn why traditional network architectures are falling short on delivering those services, and how Secure Access Service Edge (or SASE) has emerged as the next phase of distributed enterprise networking. You’ll learn:

    - How SASE brings a fundamental change to the way WANs are deployed and managed

    - Why integrating networking and security services lets you deliver a network that more efficiently powers distributed environments

    - Why a flexible, scalable and cloud-managed DDI (DNS, DHCP, IPAM) foundation is required to deliver highly available, high performance network and security services.

    - How the Infoblox BloxOne Platform utilizes a microservices and container-based architecture to:

    Streamline network operations
    Reduces total cost of ownership
    Expand robust SaaS-based services

    Register now to learn more about how cloud-managed DDI and the Infoblox BloxOne platform can help you deliver applications faster and more efficiently at the edge.
  • New Independent Research Reveals DNS is Key to Network Security (APAC) Recorded: Aug 20 2020 46 mins
    Anthony James, VP Product Marketing Infoblox & David Holmes, Senior Analyst Security & Risk, Forrester
    Webinar featuring latest research from Forrester and a survey of over 200 elite security experts

    With the ever-present threat of Cyberattackers, it is essential to ensure that network infrastructure, users, and customer data be secured, no matter where that data is stored. Domain name systems (DNS) as a foundational network service is critical for connectivity, but cannot be overlooked as a first-level security control, especially in times of crisis and change, like the recent influx of home/remote workers.

    Infoblox commissioned Forrester Consulting to survey enterprise Security and Response (S&R) professionals and the results reveal that they most often use DNS to detect and block threats early in the kill chain, identify compromised devices, and accelerate incident investigation and response times by making it more efficient.

    This webinar will reveal the top findings from forward-looking enterprises that underscore the role of DNS in cybersecurity practices including:

    - The use of DNS as a starting point for threat investigations
    - The use of DNS security to catch modern threats
    - The use of DNS security to protect from cyberattacker techniques that other security tools miss
    - The use of DNS in automating and accelerating incident response.
  • New Independent Research Reveals DNS is Key to Network Security (EMEA) Recorded: Aug 19 2020 46 mins
    Anthony James, VP Product Marketing Infoblox & David Holmes, Senior Analyst Security & Risk, Forrester
    Webinar featuring latest research from Forrester and a survey of over 200 elite security experts

    With the ever-present threat of Cyberattackers, it is essential to ensure that network infrastructure, users, and customer data be secured, no matter where that data is stored. Domain name systems (DNS) as a foundational network service is critical for connectivity, but cannot be overlooked as a first-level security control, especially in times of crisis and change, like the recent influx of home/remote workers.

    Infoblox commissioned Forrester Consulting to survey enterprise Security and Response (S&R) professionals and the results reveal that they most often use DNS to detect and block threats early in the kill chain, identify compromised devices, and accelerate incident investigation and response times by making it more efficient.

    This webinar will reveal the top findings from forward-looking enterprises that underscore the role of DNS in cybersecurity practices including:

    - The use of DNS as a starting point for threat investigations
    - The use of DNS security to catch modern threats
    - The use of DNS security to protect from cyberattacker techniques that other security tools miss
    - The use of DNS in automating and accelerating incident response.
  • New Independent Research Reveals DNS is Key to Network Security Recorded: Aug 18 2020 46 mins
    Anthony James, VP Product Marketing Infoblox & David Holmes, Senior Analyst Security & Risk, Forrester
    Webinar featuring latest research from Forrester and a survey of over 200 elite security experts

    With the ever-present threat of Cyberattackers, it is essential to ensure that network infrastructure, users, and customer data be secured, no matter where that data is stored. Domain name systems (DNS) as a foundational network service is critical for connectivity, but cannot be overlooked as a first-level security control, especially in times of crisis and change, like the recent influx of home/remote workers.

    Infoblox commissioned Forrester Consulting to survey enterprise Security and Response (S&R) professionals and the results reveal that they most often use DNS to detect and block threats early in the kill chain, identify compromised devices, and accelerate incident investigation and response times by making it more efficient.

    This webinar will reveal the top findings from forward-looking enterprises that underscore the role of DNS in cybersecurity practices including:

    - The use of DNS as a starting point for threat investigations
    - The use of DNS security to catch modern threats
    - The use of DNS security to protect from cyberattacker techniques that other security tools miss
    - The use of DNS in automating and accelerating incident response.
  • Foundational Network and Security Building Blocks for Digital Transformation Recorded: Aug 12 2020 46 mins
    PG Menon, Senior Director of Product Marketing at Infoblox
    Infoblox DNS, DHCP and IP Address Management (or DDI) Core Network Services deliver next-level visibility, resiliency and control for traditional, software-defined, and multi-cloud networking environments. It empowers IT and DevOps through automated provisioning and centralized control of the distributed enterprise, ensuring that only approved device access network resources. Cloud service requests are directed to the most efficient entry points, and guarantees local survivability of active sessions even if datacenter connections are lost. Our capabilities enable you to stay ahead of the growing demands of your organization and helps protect against rising cyber security threats and improves remediation response times. This webinar will cover how to:

    - Simplify and automate multi-cloud deployments
    - Strengthen and optimize your security posture
    - Provide cloud-native foundation for locally survivable secure Edge
  • Hack No! Learn How the Pandemic is Creating a New Network Security Paradigm Recorded: Jul 30 2020 61 mins
    Cricket Liu, Srikrupa Srivatsan, Nick Weeks, John Jacobs
    Join us as DNS security expert Cricket Liu and cybersecurity veterans from Tenable, Fortinet, and Infoblox engage in a fast-paced discussion on the dramatic, long-term ramifications the global pandemic is having on network security—and why every CISO should rethink their security strategy going forward.

    By now we know COVID-19 has forced organizations to Work From Home (WFH), essentially bypassing sophisticated security stacks designed for corporate locations. In the short term, distributed enterprises have fortified remote security measures to help compensate for these at-home vulnerabilities. However, the pandemic has also revealed troubling gaps in network security that have broader implications for expanding hybrid and multi-cloud networks, especially at the edge.

    In this lively conversation, renowned DNS expert Cricket Liu, Infoblox Security Product Manager Srikrupa Srivatsan, Fortinet Vice President, Global Solutions John Jacobs, and Tenable Product Marketing Manager, Integrations and Alliances Nick Weeks challenge us to examine “the new normal” for network security. Not only will they outline best practices for securing remote workers as they become increasingly vulnerable to cyber attackers, they’ll frame what long-term foundational security measures every network must consider to best ensure WFH employees can continue to be protected in any new environment.

    You'll learn:

    - Which new attacks are most potent against remote workers
    - Best practices for developing a WFH security strategy
    - Key new architectures and long-term planning requirements
    - A blueprint for future foundational security enhancements
    - Case study of large-scale WFH security deployments
  • How to use Foundational Security to Combat Persistence Ransomware Variants Recorded: Jul 23 2020 44 mins
    Srikrupa Srivatsan
    Ransomware is an old foe that has reemerged bigger and better than ever. Enterprise focused ransomware attacks are up significantly, and several variants have emerged recently that are as persistent as they are dangerous. The complexity of today’s networks and the large number of remote workers have made it easier for attacks like ransomware and phishing to take hold. This webinar will cover:

    *Recent ransomware variants over the last 12 months
    *The high cost of extortion of ransomware attacks
    *How foundational security can help mitigate ransomware and phishing attacks, even if your users are working from home
  • How to use Foundational Security to Combat Persistence Ransomware Variants Recorded: Jul 14 2020 45 mins
    Srikrupa Srivatsan
    Ransomware is an old foe that has reemerged bigger and better than ever. Enterprise focused ransomware attacks are up significantly, and several variants have emerged recently that are as persistent as they are dangerous. The complexity of today’s networks and the large number of remote workers have made it easier for attacks like ransomware and phishing to take hold. This webinar will cover:

    *Recent ransomware variants over the last 12 months
    *The high cost of extortion of ransomware attacks
    *How foundational security can help mitigate ransomware and phishing attacks, even if your users are working from home
  • Foundational Security for a Cloud-First World Recorded: Jul 9 2020 47 mins
    Srikrupa Srivatsan
    We live in an age of digital transformation. While multi-cloud, SD-WAN, edge computing and IoT have significantly modernized a company’s business and made them competitive, they have also caused an increase in risk to its infrastructure, data and brand. We need a foundational, scalable approach that secures devices, data and applications wherever they are - on-premises, in the cloud, in the branch or at the edge. Join this session to learn how foundational security can:

    * Cost-effectively secure a cloud first world
    * Support, secure and provide visibility into multi cloud platforms
    * Protect devices and data wherever they may be – on-premises, at home or in a branch office
    * Enable faster incident response with valuable network and threat context
  • Foundational Security for a Cloud-First World Recorded: Jun 18 2020 48 mins
    Srikrupa Srivatsan
    We live in an age of digital transformation. While multi-cloud, SD-WAN, edge computing and IoT have significantly modernized a company’s business and made them competitive, they have also caused an increase in risk to its infrastructure, data and brand. We need a foundational, scalable approach that secures devices, data and applications wherever they are - on-premises, in the cloud, in the branch or at the edge. Join this session to learn how foundational security can:

    * Cost-effectively secure a cloud first world
    * Support, secure and provide visibility into multi cloud platforms
    * Protect devices and data wherever they may be – on-premises, at home or in a branch office
    * Enable faster incident response with valuable network and threat context
  • Threat Landscape – A lot has changed in 60 Days Recorded: Jun 4 2020 32 mins
    Srikrupa Srivatsan
    From increased cyberthreat exposure of work-from-home users to coronavirus related malware campaigns, the threat landscape in 2020 has significantly changed from even just 2 months ago. Many organizations continue to require their non-essential workers to work from home, which means these remote users are exposed to the ever-increasing barrage of new malware campaigns on the Internet. We also see escalating APT attacks on healthcare and essential services, designed to steal research from these institutions as the world races to find a vaccine to the pandemic.

    Join this webinar to learn about:
    * Latest cyberthreats that thrive in today’s chaotic world
    * Malware trends that may continue well into 2020 and beyond
    * Best practice tips to extending enterprise level security to users and devices, wherever they may be
  • Thwarting Increased APT Attacks on Health Care Organizations Recorded: Jun 1 2020 61 mins
    Srikrupa Srivatsan, Chris Usserman
    Thwarting Increased APT Attacks on Health Care Organizations and Essential Services as They Race for a COVID-19 Treatment

    As healthcare organizations, pharmaceutical companies, and local governments work round the clock to respond to and provide effective treatment options to the COVID-19 pandemic, APT (Advanced Persistent Threat) groups are ramping up their attacks on these institutions, as highlighted by the recently issued joint alert by the US Department of Homeland Security (DHS), Cybersecurity and Infrastructure Security Agency (CISA), and the UK’s National Cyber Security Centre (NCSC).

    Attacks range from password spraying to looking for vulnerabilities in unpatched software to leveraging previously observed threats such as phishing. The goal is simple – to steal identities, and research related to potential vaccines.

    When you attend you’ll learn about:

    -New and increasing cyberattack campaigns on healthcare and essential services
    -How BloxOne™ Threat Defense can help you better identify and block these new threats
    -Protecting sensitive data and extending enterprise DNS security to remote employees
    -Identifying and mitigating criminal and nation-state cyber espionage domains
    -Tagging COVID-19 related indicators of compromise (IOCs)
    -Alerting your existing security awareness applications of identified threats faster
  • How to Secure Your Employees Working from Home Against Cyberthreats Recorded: Apr 29 2020 57 mins
    Srikrupa Srivatsan; Kevin Zettel
    Working from home could be the “new norm” for a little while. Companies, in order to ensure social distancing among their employees and curb the spread of COVID-19, have mandated that all non-essential workers stay and work out of their home. Organizations have had very little time to prepare for such large scale remote work, let alone think about how to secure ‘work from home’ users. These remote workers still need to access enterprise applications in the cloud, and work with and store corporate data on their devices.

    Join this webinar to learn about:

    -Latest cyberthreats that take advantage of the chaotic nature of these times
    -Security challenges in protecting large scale remote workforce
    -Using foundational network services to extend enterprise security to work from home environments

    Watch now and learn how to stay ahead of latest cyberthreats.
  • Say "Hack, No!" to Ransomware and Data Theft Recorded: Jan 7 2020 58 mins
    Cricket Liu (Chief DNS Architect, Infoblox), Ben April (CTO at Farsight Security, Inc), Dave Shackleford (Consultant at SANS)
    Locking Down the Last Mile – DoT & DoH

    Securing your DNS infrastructure has never been more critical: Today, more than half of all ransomware and data theft attacks, and over 90% of malware incidents, originate through the DNS vector. But now there’s a solution: DoT and DoH.

    It is no secret that the original DNS design did not take security into account. In particular, the “last mile” problem has been an alarming security flaw in DNS for many years. With the emergence of DNS over TLS (DoT) and DNS over HTTPS (DoH) in recent years, however, we finally have a solution.

    Join Infoblox for a timely discussion on the latest DNS security standards, hosted by Infoblox's Chief DNS Architect Cricket Liu. He’ll be leading a Q&A with Dave Shackleford from the SANS Institute and Ben April, Chief Technology Officer, from Farsight Security. During this session, you’ll have a chance to develop an in-depth understanding of DoT and DoH and get answers to your questions such as:

    - How does DoH protect per-hop communication between server and client?
    - What are the differences between DoT strict mode and opportunistic mode?
    - Are DoH and DoT replacements for DNSSEC? Or complementary to it?
    - What are the implementation steps necessary for rolling out DoT and DoH?

    Who Should Attend: Security and network personnel charged with protecting infrastructure and data from cyber-attacks.
  • Network Discovery and Inventory: Applying Defense in Depth Recorded: Dec 13 2019 62 mins
    Michael Ell, Chris Hindy
    No matter how many next-generation firewalls, intrusion detection, end-point security or other similar platforms an enterprise has deployed, their effect can be muted during investigation and remediation phases if the network cannot be accurately described. To accurately describe the network, discovery is a key and critical component.

    Moreover, being able to identify unexpected configuration drift is also key to network security.

    >Was a vulnerable feature suddenly enabled on the routing platform?
    >Have devices suddenly been reloaded with unexpected software versions?
    >Without a continuous discovery process and the ability to audit and collaborate over the results, network and security teams are blind to these sorts of changes that might be indicators of compromise.

    Join Infoblox and Empowered Networks for this lively discussion on, "Network Discovery and Inventory: Applying Defense in Depth” where we’ll demonstrate:

    >How to discover and profile all of the devices on the network
    >How to establish and validate internal configuration standards
    >How to create an unimpeachable source for multiple teams to collaborate on network configuration security
  • Simplify your SD-WAN transition with Infoblox BloxOne™ DDI Recorded: Dec 13 2019 29 mins
    Daniel Dochita
    Organizations depend on reliable Internet connectivity, which in turn requires high availability DDI services. By coupling SD-WAN with BloxOne DDI, branch office connectivity can achieve new levels of efficiency, robustness and security. This shift is forcing organizations to focus on a digital transformation strategy that optimizes the ability to access and consume digital technologies like SD-WAN.

    Watch the webinar and learn how to unpick these challenges and explain how Infoblox’s solutions can help you meet both today and tomorrow’s challenges. We will be discussing:

    >Cloud strategy - Your transition to SD-WAN & Infoblox BloxOne DDI
    >Branch Security – How you can unify your security policy for all locations
    >Visibility – Gain a precise view of your networks now the perimeter has shifted
  • Learn to Think Like a Hacker to Stop Attacks Faster Recorded: Dec 13 2019 56 mins
    Mike Zuckerman
    Strengthen Your Security Posture with the MITRE ATT&CK Framework

    The MITRE ATT&CK Framework is a comprehensive, up-to-date knowledge base of cyberattacker tactics and techniques gathered from actual observation of attacker behavior.

    Watch the webinar and discover how MITRE ATT&CK can help you make better, faster decisions about assessing risks, deploying new security controls and stopping attacks faster and more efficiently.

    With the takeaways from this webinar, you will be ideally positioned to:

    >Anticipate what an attacker will do next and respond accordingly
    >Strengthen your security based on real-world use cases
    >Stop intruders in their tracks if and when an attack occurs

    Know What to Expect When Attackers Strike
Delivering Next-Level Networking Experiences
Infoblox enables next-level network experiences through its Secure Cloud-Managed Network Services with 8,000 customers including 350 of the Fortune 500. A recognized industry leader, we are relentless in our pursuit of network simplicity. Our solutions bring next-level simplicity, security, reliability and automation to on-premises, cloud and hybrid networks, setting customers on a path to a single pane of glass for network management. Next-level security helps protect against the rising flood of cyberattacks. Next-level reliability provides the high availability and control needed to enable digital transformation. Next-level automation vastly simplifies the management of core network services in any cloud environment. More at www.Infoblox.com.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Learn to Think Like a Hacker to Stop Attacks Faster
  • Live at: Dec 13 2019 12:05 am
  • Presented by: Mike Zuckerman
  • From:
Your email has been sent.
or close