Hi [[ session.user.profile.firstName ]]

Close the Back Door to Your Data

We all know that data breaches are costly. They cause business disruption, brand damage and loss of productivity. Modern networks are complex and more distributed than ever, and data resides everywhere, which makes protecting your data much more difficult. While there are several pathways by which data can be stolen from a network, there is a back door that attackers often use – your DNS.

Join Infoblox for this webinar to learn:

- How data exfiltration over DNS works
- What detection methods can be used
- Best practices for a unified and fast data breach response
Recorded May 12 2021 44 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Krupa Srivatsan, Director of Product Marketing at Infoblox
Presentation preview: Close the Back Door to Your Data

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Ensure Uptime for Multi-Cloud Environments May 26 2021 5:00 pm UTC 61 mins
    PG Menon, Senior Director of Product Marketing at Infoblox and Alex Del Rio
    Anytime, anywhere access to applications is one of the primary reasons organizations move to cloud. But free and open-source tools, common in enterprise environments, can prevent businesses from realizing that goal. Robust, feature rich and secure tools are necessary, especially for foundational elements such as core network services.

    In this webinar, PG Menon and Alex Del Rio will discuss:

    - Recent market trends and technology transitions

    - Business reasons for Enterprises to work with Infoblox

    Attend the webinar to learn how Infoblox can help you realize your business continuity goals by laying the right foundation for cloud environments.
  • Ensure Uptime for Multi-Cloud Environments May 26 2021 9:00 am UTC 61 mins
    PG Menon, Senior Director of Product Marketing at Infoblox and Alex Del Rio
    Anytime, anywhere access to applications is one of the primary reasons organizations move to cloud. But free and open-source tools, common in enterprise environments, can prevent businesses from realizing that goal. Robust, feature rich and secure tools are necessary, especially for foundational elements such as core network services.

    In this webinar, PG Menon and Alex Del Rio will discuss:

    - Recent market trends and technology transitions

    - Business reasons for Enterprises to work with Infoblox

    Attend the webinar to learn how Infoblox can help you realize your business continuity goals by laying the right foundation for cloud environments.
  • Ensure Uptime for Multi-Cloud Environments May 26 2021 1:00 am UTC 61 mins
    PG Menon, Senior Director of Product Marketing at Infoblox and Alex Del Rio
    Anytime, anywhere access to applications is one of the primary reasons organizations move to cloud. But free and open-source tools, common in enterprise environments, can prevent businesses from realizing that goal. Robust, feature rich and secure tools are necessary, especially for foundational elements such as core network services.

    In this webinar, PG Menon and Alex Del Rio will discuss:

    - Recent market trends and technology transitions

    - Business reasons for Enterprises to work with Infoblox

    Attend the webinar to learn how Infoblox can help you realize your business continuity goals by laying the right foundation for cloud environments.
  • The 4th Annual Global Study on Exchanging CyberThreat Intelligence May 19 2021 5:00 pm UTC 51 mins
    Michael Zuckerman, Product Marketing Manager, Infoblox, Dr Larry Ponemon: Chairman and Founder of Ponemon Institute
    In this webinar, Dr. Larry Ponemon and Michael Zuckerman will review the findings of the proprietary Ponemon research study conducted in North America, EMEA and Asia-Pacific sponsored by Infoblox. The research reveals how timely and accurate threat intelligence can prevent or mitigate the consequences of a cyberattack.

    Attend this live webinar to learn why participating in initiatives or programs for exchanging threat intelligence with peers, industry groups, IT vendors and government results in a stronger security posture. The webinar will also explore how your organization can adopt the following:

    - Ensure threat intelligence is timely, less complex and more actionable
    - Use metrics to improve the ability to prioritize threat intelligence and its timely delivery
    - Use ROI metrics to help organizations look at the following factors: reduction in the dwell time of a breach, reduction in the number of successful breaches and faster, more effective incident response
    - Increase use of automation to investigate threats

    Learn why the effective exchange of cyber threat intelligence should be key component of your organization’s security strategy in this ever-changing threat landscape.
  • The 4th Annual Global Study on Exchanging CyberThreat Intelligence May 19 2021 9:00 am UTC 51 mins
    Michael Zuckerman, Product Marketing Manager, Infoblox, Dr Larry Ponemon: Chairman and Founder of Ponemon Institute
    In this webinar, Dr. Larry Ponemon and Michael Zuckerman will review the findings of the proprietary Ponemon research study conducted in North America, EMEA and Asia-Pacific sponsored by Infoblox. The research reveals how timely and accurate threat intelligence can prevent or mitigate the consequences of a cyberattack.

    Attend this live webinar to learn why participating in initiatives or programs for exchanging threat intelligence with peers, industry groups, IT vendors and government results in a stronger security posture. The webinar will also explore how your organization can adopt the following:

    - Ensure threat intelligence is timely, less complex and more actionable
    - Use metrics to improve the ability to prioritize threat intelligence and its timely delivery
    - Use ROI metrics to help organizations look at the following factors: reduction in the dwell time of a breach, reduction in the number of successful breaches and faster, more effective incident response
    - Increase use of automation to investigate threats

    Learn why the effective exchange of cyber threat intelligence should be key component of your organization’s security strategy in this ever-changing threat landscape.
  • The 4th Annual Global Study on Exchanging CyberThreat Intelligence May 19 2021 1:00 am UTC 51 mins
    Michael Zuckerman, Product Marketing Manager, Infoblox, Dr Larry Ponemon: Chairman and Founder of Ponemon Institute
    In this webinar, Dr. Larry Ponemon and Michael Zuckerman will review the findings of the proprietary Ponemon research study conducted in North America, EMEA and Asia-Pacific sponsored by Infoblox. The research reveals how timely and accurate threat intelligence can prevent or mitigate the consequences of a cyberattack.

    Attend this live webinar to learn why participating in initiatives or programs for exchanging threat intelligence with peers, industry groups, IT vendors and government results in a stronger security posture. The webinar will also explore how your organization can adopt the following:

    - Ensure threat intelligence is timely, less complex and more actionable
    - Use metrics to improve the ability to prioritize threat intelligence and its timely delivery
    - Use ROI metrics to help organizations look at the following factors: reduction in the dwell time of a breach, reduction in the number of successful breaches and faster, more effective incident response
    - Increase use of automation to investigate threats

    Learn why the effective exchange of cyber threat intelligence should be key component of your organization’s security strategy in this ever-changing threat landscape.
  • Close the Back Door to Your Data Recorded: May 12 2021 44 mins
    Krupa Srivatsan, Director of Product Marketing at Infoblox
    We all know that data breaches are costly. They cause business disruption, brand damage and loss of productivity. Modern networks are complex and more distributed than ever, and data resides everywhere, which makes protecting your data much more difficult. While there are several pathways by which data can be stolen from a network, there is a back door that attackers often use – your DNS.

    Join Infoblox for this webinar to learn:

    - How data exfiltration over DNS works
    - What detection methods can be used
    - Best practices for a unified and fast data breach response
  • Ensure Uptime for Multi-Cloud Environments Recorded: May 12 2021 61 mins
    PG Menon, Senior Director of Product Marketing at Infoblox and Alex Del Rio
    Anytime, anywhere access to applications is one of the primary reasons organizations move to cloud. But free and open-source tools, common in enterprise environments, can prevent businesses from realizing that goal. Robust, feature rich and secure tools are necessary, especially for foundational elements such as core network services.

    In this webinar, PG Menon and Alex Del Rio will discuss:

    - Recent market trends and technology transitions

    - Business reasons for Enterprises to work with Infoblox

    Attend the webinar to learn how Infoblox can help you realize your business continuity goals by laying the right foundation for cloud environments.
  • Coffee Chat with Cricket-Boosting Your Cyber Reputation While Minimizing Risk Recorded: May 11 2021 58 mins
    Cricket Liu: Chief DNS Architect, Infoblox Krupa Srivatsan: Director, Product Marketing, Infoblox
    Cyber reputation is at the forefront for many companies as work from anywhere continues and ransomware and supply chain attacks continue to dominate the headlines. Organizations are gravitating towards third party audits and security scoring to assess their own risk profile while evaluating the vendors in their supply chain. Further, as attacks continue to evolve, cyber insurance coverage is being sought out to minimize the financial impact and risk from cyber-attacks. Cost of cyber insurance can vary anywhere form low hundred thousand to millions of dollars per year, and insurance companies use security scores as a way to assess risk of applicants. If a company’s security score is high, chance of breach is considered lower, and they can get lower premiums from their cyber insurance company.

    In this Coffee Chat, we will discuss how DNS, being in the middle of Internet communications, can be used for minimizing risk from botnet infections, malware propagation, data exfiltration and C&C communications, thereby improving a company’s security score significantly. This higher security score leads to a better company brand image and lower insurance premiums.
  • Threat Intelligence Update: Emerging Cyberthreats, Malware, and Ransomware Recorded: Apr 28 2021 52 mins
    Michael Zuckerman, Product Marketing Manager, Infoblox
    Infoblox is pleased to present our Q1 2021 Threat Intelligence webinar. Our Q1 2021 Threat Intelligence webinar is based upon our Cyber Intelligence Unit (CIU) research data published between 1 January 2021 through 31 March 2021 in our Q1 2021 Infoblox Quarterly Cyber Threat Report. This session will include data on the original research insight into significant threats recently observed, detailed analysis of advanced malware campaigns, and analysis of new significant attacks in the news.

    Key takeaways:
    - New and recently emerged malware variants and trends
    - State, local, and municipal government in the bullseye
    - How these differ from other variants we have seen in the past
    - Assault on software developer's CI/CD pipeline
    - The state of ransomware
    - Defensive tactics that work
  • Threat Intelligence Update: Emerging Cyberthreats, Malware, and Ransomware Recorded: Apr 28 2021 52 mins
    Michael Zuckerman, Product Marketing Manager, Infoblox
    Infoblox is pleased to present our Q1 2021 Threat Intelligence webinar. Our Q1 2021 Threat Intelligence webinar is based upon our Cyber Intelligence Unit (CIU) research data published between 1 January 2021 through 31 March 2021 in our Q1 2021 Infoblox Quarterly Cyber Threat Report. This session will include data on the original research insight into significant threats recently observed, detailed analysis of advanced malware campaigns, and analysis of new significant attacks in the news.

    Key takeaways:
    - New and recently emerged malware variants and trends
    - State, local, and municipal government in the bullseye
    - How these differ from other variants we have seen in the past
    - Assault on software developer's CI/CD pipeline
    - The state of ransomware
    - Defensive tactics that work
  • Threat Intelligence Update: Emerging Cyberthreats, Malware, and Ransomware Recorded: Apr 28 2021 52 mins
    Michael Zuckerman, Product Marketing Manager, Infoblox
    Infoblox is pleased to present our Q1 2021 Threat Intelligence webinar. Our Q1 2021 Threat Intelligence webinar is based upon our Cyber Intelligence Unit (CIU) research data published between 1 January 2021 through 31 March 2021 in our Q1 2021 Infoblox Quarterly Cyber Threat Report. This session will include data on the original research insight into significant threats recently observed, detailed analysis of advanced malware campaigns, and analysis of new significant attacks in the news.

    Key takeaways:
    - New and recently emerged malware variants and trends
    - State, local, and municipal government in the bullseye
    - How these differ from other variants we have seen in the past
    - Assault on software developer's CI/CD pipeline
    - The state of ransomware
    - Defensive tactics that work
  • Securing Your Hybrid Workplace Recorded: Apr 15 2021 37 mins
    Krupa Srivatsan, Director of Product Marketing at Infoblox
    So your organization, like most, have realized that work from anywhere is here to stay for a while. As companies start to look at a hybrid workplace model, where 10 or 20% of their workforce start to come back to the offices, a new set of challenges will arise. And topping that list is how to provide consistent security that follows the employee, whether he is working from home or in the office. The accelerated shift from HQ/DC centric model to a distributed, edge to cloud model has placed new demands on IT, especially when it comes to security. Data, applications and users are everywhere and the broader use of cloud and SaaS has increased the attack surface, while placing a heavy burden on already strained SecOps teams.

    Join this webinar to learn how hybrid security can:

    - Provide ubiquitous visibility for the borderless enterprise
    - Deliver consistent protection for your hybrid workforce while ensuring business continuity
    - Improve SecOps productivity through automated data sharing
  • Protecting the Cloud with the MITRE ATT&CK Framework Recorded: Mar 17 2021 56 mins
    Michael Zuckerman, Product Marketing Manager, Infoblox
    Accurately assessing your security posture is a tricky game. The rapid move to the cloud has made this much more complex. Fortunately, MITRE ATT&CK came along to help eliminate this problem. The MITRE ATT&CK cloud matrix tactics and techniques work with IaaS many clouds including Microsoft Azure, the Google Cloud Platform, and Amazon Web Services.

    The MITRE ATT&CK framework is the most comprehensive and authoritative set of cyber attacker tactics, techniques, and procedures anywhere in the world. Attend our webinar and learn more about:

    - How can MITRE ATT&CK help you think like a cyber attacker to better defend your enterprise both on-premise and in the cloud?
    - How is MITRE ATT&CK organized and how can you use it?
    - Why is MITRE ATT&CK one of the best cyber attacker oriented frameworks?
    - Why is the use of MITRE ATT&CK compelling for the cloud?
  • Protecting the Cloud with the MITRE ATT&CK Framework (EMEA) Recorded: Mar 17 2021 56 mins
    Michael Zuckerman, Product Marketing Manager, Infoblox
    Accurately assessing your security posture is a tricky game. The rapid move to the cloud has made this much more complex. Fortunately, MITRE ATT&CK came along to help eliminate this problem. The MITRE ATT&CK cloud matrix tactics and techniques work with IaaS many clouds including Microsoft Azure, the Google Cloud Platform, and Amazon Web Services.

    The MITRE ATT&CK framework is the most comprehensive and authoritative set of cyber attacker tactics, techniques, and procedures anywhere in the world. Attend our webinar and learn more about:

    - How can MITRE ATT&CK help you think like a cyber attacker to better defend your enterprise both on-premise and in the cloud?
    - How is MITRE ATT&CK organized and how can you use it?
    - Why is MITRE ATT&CK one of the best cyber attacker oriented frameworks?
    - Why is the use of MITRE ATT&CK compelling for the cloud?
  • Protecting the Cloud with the MITRE ATT&CK Framework (APAC) Recorded: Mar 17 2021 56 mins
    Michael Zuckerman, Product Marketing Manager, Infoblox
    Accurately assessing your security posture is a tricky game. The rapid move to the cloud has made this much more complex. Fortunately, MITRE ATT&CK came along to help eliminate this problem. The MITRE ATT&CK cloud matrix tactics and techniques work with IaaS many clouds including Microsoft Azure, the Google Cloud Platform, and Amazon Web Services.

    The MITRE ATT&CK framework is the most comprehensive and authoritative set of cyber attacker tactics, techniques, and procedures anywhere in the world. Attend our webinar and learn more about:

    - How can MITRE ATT&CK help you think like a cyber attacker to better defend your enterprise both on-premise and in the cloud?
    - How is MITRE ATT&CK organized and how can you use it?
    - Why is MITRE ATT&CK one of the best cyber attacker oriented frameworks?
    - Why is the use of MITRE ATT&CK compelling for the cloud?
  • Workplace Transformation for the Modern Enterprise Recorded: Mar 3 2021 62 mins
    Cricket Liu and Krupa Srivatsan
    Many companies are on a journey to modernization, be it accelerating adoption of SaaS, implementing SDN, rolling out IoT or embracing a work from anywhere approach. These transformations take time, and the journey is not without challenges. The underlying infrastructure that companies use should help them to keep control, eliminate dangers of blind spots, simplify multi-cloud deployments and embed security as they expand, modernize and transform.

    In this Coffee Chat, Cricket Liu and Krupa Srivatsan will discuss how a foundational network and security base can support traditional networks while building a bridge to transformations, using a hybrid approach.
  • The Global Quest for Sustainable Work-From-Anywhere Security Recorded: Feb 17 2021 41 mins
    Michael Osterman, President & Founder of Osterman Research & Bob Hansmann, Infoblox Security PMM
    What are the more permanent changes for cybersecurity you might expect in the wake of the COVID pandemic? A 2021 survey by Osterman Research concluded that, “The pandemic put a spotlight on the inadequacies of pre-pandemic mobile worker security and served as a catalyst for executives and others to support the necessary investments to enable a productive work-from-anywhere environment."

    Come listen to Michael Osterman, President and Founder of Osterman Research, as he discusses the implications of this survey with Infoblox Security PMM, Bob Hansmann. Some of the key findings to be discussed include:

    - Which capabilities suffered most during the initial pandemic response, and how?
    - What common security changes were made in response to COVID-19, and how well did they work?
    - How permanent are the security changes made to support an organization’s COVID response?
    - What is the long-term state of endpoint security look like?

    Join us to learn from hundreds of global IT and security leaders how endpoint security has evolved over the past 12 to 18 months and how this is shaping the future of security.
  • The Global Quest for Sustainable Work-From-Anywhere Security Recorded: Feb 17 2021 41 mins
    Michael Osterman, President & Founder of Osterman Research & Bob Hansmann, Infoblox Security PMM
    What are the more permanent changes for cybersecurity you might expect in the wake of the COVID pandemic? A 2021 survey by Osterman Research concluded that, “The pandemic put a spotlight on the inadequacies of pre-pandemic mobile worker security and served as a catalyst for executives and others to support the necessary investments to enable a productive work-from-anywhere environment."

    Come listen to Michael Osterman, President and Founder of Osterman Research, as he discusses the implications of this survey with Infoblox Security PMM, Bob Hansmann. Some of the key findings to be discussed include:

    - Which capabilities suffered most during the initial pandemic response, and how?
    - What common security changes were made in response to COVID-19, and how well did they work?
    - How permanent are the security changes made to support an organization’s COVID response?
    - What is the long-term state of endpoint security look like?

    Join us to learn from hundreds of global IT and security leaders how endpoint security has evolved over the past 12 to 18 months and how this is shaping the future of security.
  • The Global Quest for Sustainable Work-From-Anywhere Security Recorded: Feb 17 2021 41 mins
    Michael Osterman, President & Founder of Osterman Research & Bob Hansmann, Infoblox Security PMM
    What are the more permanent changes for cybersecurity you might expect in the wake of the COVID pandemic? A 2021 survey by Osterman Research concluded that, “The pandemic put a spotlight on the inadequacies of pre-pandemic mobile worker security and served as a catalyst for executives and others to support the necessary investments to enable a productive work-from-anywhere environment."

    Come listen to Michael Osterman, President and Founder of Osterman Research, as he discusses the implications of this survey with Infoblox Security PMM, Bob Hansmann. Some of the key findings to be discussed include:

    - Which capabilities suffered most during the initial pandemic response, and how?
    - What common security changes were made in response to COVID-19, and how well did they work?
    - How permanent are the security changes made to support an organization’s COVID response?
    - What is the long-term state of endpoint security look like?

    Join us to learn from hundreds of global IT and security leaders how endpoint security has evolved over the past 12 to 18 months and how this is shaping the future of security.
Delivering Next-Level Networking Experiences
Infoblox enables next-level network experiences through its Secure Cloud-Managed Network Services with 8,000 customers including 350 of the Fortune 500. A recognized industry leader, we are relentless in our pursuit of network simplicity. Our solutions bring next-level simplicity, security, reliability and automation to on-premises, cloud and hybrid networks, setting customers on a path to a single pane of glass for network management. Next-level security helps protect against the rising flood of cyberattacks. Next-level reliability provides the high availability and control needed to enable digital transformation. Next-level automation vastly simplifies the management of core network services in any cloud environment. More at www.Infoblox.com.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Close the Back Door to Your Data
  • Live at: May 12 2021 6:00 pm
  • Presented by: Krupa Srivatsan, Director of Product Marketing at Infoblox
  • From:
Your email has been sent.
or close