A well-run information security program requires not only great visibility but also the necessary control. You can be doing all the right things with security – solid standards and well-documented policies, ongoing user education, and seemingly reasonable network and endpoints controls – but gaps can still exist. Even with the best executive involvement and oversight, vulnerabilities can be exploited when the worst-case scenarios come to fruition. Security around DNS is often the weak link. Whether it’s an automated computer transaction or seemingly benign end user behavior, choices have consequences and DNS security oversights often bring exploits to life.
In this webinar, independent information security consultant and author of Hacking for Dummies, Kevin Beaver, will explore how DNS plays a part in your overall security posture and risk mitigation. Kevin will discuss DNS-related threats and vulnerabilities along with their tangible business impact.
Tune in to find out what you can do to bring your current security efforts full circle.