Hi [[ session.user.profile.firstName ]]

Infoblox #3: DNS….. One of the Best Weapons for Securing Networks?

Today’s sophisticated cybersecurity attacks often unfold in the blink of an eye. To respond quickly, your security teams need to see security incidents as they happen to ensure that attempts to hack your server environment are thwarted before entry into your machines. Whether detecting malware, helping to prevent and disrupt command and control communication, ransomware and phishing attacks – DNS can help with this and much more. But are you leveraging it as part of your cyber strategy? Nearly all threats use the DNS system therefore threats in your network can easily be seen in your DNS data. Join Infoblox and (ISC)2 on March 21, 2019 at 1:00PM Eastern as we bring in experts from IDC and ELEVI for a discussion on how leveraging DNS can help identify attacks as they happen or even prevent them before they happen, remediate attacks faster, and help detect and stop malware from spreading.
Recorded Mar 21 2019 60 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Chris Kissel, IDC, Research Director, Worldwide Security Products; Dawn Bedard, Sen Technologist; Elevi Assocs; B. Dunlap
Presentation preview: Infoblox #3: DNS….. One of the Best Weapons for Securing Networks?

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Migrating to the Cloud Safely & Securely - Imperva Part 3 May 23 2019 5:00 pm UTC 60 mins
    Shawn Ryan, Sr. Product Marketing Manager, Imperva; Brandon Dunlap (Moderator)
    Data capture, storage, and usage continues to grow at exponential rates. As a result, and in an effort to obtain operational efficiencies, many new organizations are “born in the cloud”, while for others, the migration of data and data driven business processes to cloud environments continues to escalate rapidly. The use of third party database and related cloud service offerings to support cloud and hybrid environments is also growing and evolving. However, security teams consistently report concerns with respect to the lack visibility and oversight of their data in the cloud. Typical questions being asked by CISOs are complex and not easy to answer. Join Imperva and (ISC)2 on May, 23, 2019 at 1:00PM Eastern for an examination of these questions and how to address them effectively.
  • Gigamon #2: Application Visibility for Better Security Operations May 2 2019 5:00 pm UTC 60 mins
    John Gudmundson, Senior Product Marketing Manager, Gigamon; Brandon Dunlap (Moderator)
    Securing your infrastructure can sometimes feel like navigating a ship at night in a storm, with pirates attacking. An occasional flash of lightning allows a quick glimpse of the intruders, but you never really know when or from where the next attack is coming. What if you could illuminate the best path forward? A centralized platform gives you a single window with pervasive visibility into all network traffic – both north-south and east-west which allows improvement to the effectiveness and efficiency of all your security tools and better manage SSL decryption as well as NetFlow generation. Join Gigamon and (ISC)2 on May 2, 2019 at 1:00PM for a discussion on how to discover applications on your network you didn’t know where there, spotting potential security vulnerabilities before they become a problem and see a live demo of how you can optimize security and network performance.
  • Buying Down Risk in the New World of App Development - Imperva Part 2 Apr 25 2019 5:00 pm UTC 60 mins
    Kim Lambert, Senior Product Marketing Manager, Imperva; Tim Garon (Moderator)
    In this era of rapid modern application development, organizations often deploy code into production with critical vulnerabilities that often lead to exploitation by cybercriminals. These bad actors are on the look-out, scanning for vulnerabilities that will allow them to establish a silent foothold into your environment. Join Imperva and (ISC)2 on April 25, 2019 at 1:00PM Eastern and discover a defense in depth security strategy to protect your most valuable web applications and your business from damaging cyber-attacks.
  • Chronicle #1: How Backstory Can Help Organizations Rethink Enterprise Security Recorded: Apr 16 2019 63 mins
    Mike Hom, Product Management, Chronicle; Brandon Dunlap (Moderator)
    Today, most security teams struggle to identify and locate threats in their networks. Without the ability to find the bad actors in the network, security teams are unable to be effective in their roles. Organizations need tools to link intelligence about threats in the wild, threats in your network, and understand unique signals from both. In this webcast, we’ll examine the latest trends and downfalls in this space, and how Chronicle, an Alphabet company, is looking to solve them at a global scale with a focus on speed and efficacy. We’ll also have a demo of the Chronicle security platform, Backstory and how it can help streamline your security.
  • Gigamon #1: Network Upgrades Giving You Security Headaches? Recorded: Apr 4 2019 58 mins
    Sam Kumarsamy, Senior Product Marketing Manager, Gigamon; Brandon Dunlap (Moderator)
    As the insatiable demand for bandwidth drives the need for faster networks, organizations still need to inspect and enforce network security policies at wire speed. And that is particularly challenging when you are upgrading networks from 10GB to 40GB or from 40GB to 100GB. Join Gigamon and (ISC)2 on April 4, 2019 at 1:00PM Eastern as we discuss how to solve the security headaches that go with these network upgrades and new architectures that strengthen your security posture, simplify IT and reduce costs. We’ll also discuss how to increase your security ROI, reduce your security risk and improve threat response.
  • Best Practices for Mitigating Data Breach Risk - Imperva Part 1 Recorded: Mar 28 2019 57 mins
    Sara Pan, Sr. Prod Mktg Mgr, Imperva; Brandon Dunlap (Moderator)
    Data breach(es) remains atop the list of any CISO’s main concern. With the exponential growth of users, apps, and data, that leads to more and more legitimate data access, the attack surface expands making it harder to determine whether a data access is appropriate. Many organizations rely on traditional perimeter-based security approach, but they’re still getting breached. Additionally, trying to constrain and control the interactions between users and data by locking down usage can not only slow down business, but also frustrate users. Due to this, they may decide to work around you, creating an even bigger risk for your company. Join Imperva and (ISC)2 on March 28, 2019 at 1:00PM Eastern to learn about some best practices to mitigate data breach risk without decelerating your business growth.
  • Infoblox #3: DNS….. One of the Best Weapons for Securing Networks? Recorded: Mar 21 2019 60 mins
    Chris Kissel, IDC, Research Director, Worldwide Security Products; Dawn Bedard, Sen Technologist; Elevi Assocs; B. Dunlap
    Today’s sophisticated cybersecurity attacks often unfold in the blink of an eye. To respond quickly, your security teams need to see security incidents as they happen to ensure that attempts to hack your server environment are thwarted before entry into your machines. Whether detecting malware, helping to prevent and disrupt command and control communication, ransomware and phishing attacks – DNS can help with this and much more. But are you leveraging it as part of your cyber strategy? Nearly all threats use the DNS system therefore threats in your network can easily be seen in your DNS data. Join Infoblox and (ISC)2 on March 21, 2019 at 1:00PM Eastern as we bring in experts from IDC and ELEVI for a discussion on how leveraging DNS can help identify attacks as they happen or even prevent them before they happen, remediate attacks faster, and help detect and stop malware from spreading.
  • ExtraHop #3: How to Succeed at Threat Hunting & IR: Think Differently about Data Recorded: Mar 12 2019 59 mins
    Matt Cauthorn, VP of Cyber Security Engineering, ExtraHop; Brandon Dunlap, Moderato
    Two pillars of a successful and proactive SOC are threat hunting and incident response. The use of network traffic analysis can help improve performance in these two areas. This webcast will examine threat hunting and incident response and how network traffic analysis can make Tier 1 and Tier 3 analysts faster and more effective at validating, investigating, and responding to threats and security incidents
  • ExtraHop #2: Case Study: Proactive Security Hygiene in a Hybrid Enterprise Recorded: Feb 14 2019 56 mins
    Mike Sheward, Senior Director of Information Security, Accolade; Brandon Dunlap, Moderator
    Ever wonder how network traffic analysis (NTA) can reduce and harden an organization’s attack surface? In this webcast, the Director of Information Security at Accolade present a case study on how they use NTA to audit their security hygiene in real time, assuring that current standards for handling regulated data are being followed, and that all apps, services, and devices follow established security protocols to proactively reduce the chances of a data breach.
  • ExtraHop #1: Getting More Value from SecOps Frameworks Recorded: Feb 12 2019 53 mins
    John Matthews, CIO, ExtraHop, Brandon Dunlap (Moderator)
    Attack and Control frameworks provided by such organizations like NIST, CIS and MITRE can help enterprises to improve, understand their capabilities and build better security. Join ExtraHop and (ISC)2 for a webcast on how to leverage these frameworks to better understand how network traffic analysis can provide the visibility and actionable insights to accelerate an enterprise's success at increasing security maturity.
  • Infoblox #2 - How to Integrate and Automate Your Security Response at Scale Recorded: Feb 7 2019 53 mins
    Krupa Srivatsan Senior Prod. Mktg Mgr. Infoblox; Woodrow Brown, Dir, Partner Res & Strat, Optiv;Brandon Dunlap (Moderator)
    Your enterprise network relies on a vast assortment of security devices and solutions, each generating their own alerts. More often than not, security teams don’t have the resources to address every one of them in a timely manner. According to a 2017 EGS report, keeping up with the enormous volume of security alerts and a lack of integration are the biggest network security challenges enterprise's face. Join Infoblox, their special guest Optiv and (ISC)2 on February 7, 2019 at 1:00PM Eastern , for a live discussion on how organizations can leverage ecosystem integrations to bridge islands of security, while automating incident response through automation and orchestration.
  • Psychographics of the CISO – New Infosecurity Survey Results from 451 Research Recorded: Jan 29 2019 59 mins
    Daniel Kennedy, Research Director, Information Security, 451 Research; Brandon Dunlap (moderator)
    Security budgets continue to tick upward, but underneath the hood, increasingly hybrid architectures in enterprise IT are driving shifts in where that money is applied. GDPR has driven compliance to the forefront of security project decision making, while other pain points including user behavior and lack of qualified personnel drive specific security product deployments. Security resistance to cloud continues to decrease, while the endpoint security space remains both relevant and increasingly crowded. Join Daniel Kennedy, Research Director for 451 Research on January 29, 2019 at 1:00PM Eastern as he walks through highlights of 451's 2018 surveys and interviews of information security professionals.
  • Infoblox #1: Remediating Threats by Bridging Islands of Security Recorded: Jan 10 2019 54 mins
    Chintan Udeshi, Security Product Marketing, Infoblox; Brandon Dunlap, Moderator
    Most organizations have multiple products and services, from multiple vendors and suppliers to address their cybersecurity needs. The lack of integration and inability to share critical information results in silos of technology that cause inefficiency, lack of agility, limited visibility and a poor security posture. How can an organization solve and streamline this improve their cybersecurity operations? Join Infoblox and (ISC)2 on January 10, 2019 at 1:00PM Eastern for an examination of how Infoblox and Fortinet have joined together to assist organizations in improving their security operations and reducing time to containment.
  • RSA #3 - Transforming Secure Access to be Intelligent Recorded: Dec 7 2018 54 mins
    Ayelet Biger-Levin, CISSP, Senior Consultant, Product Marketing, RSA
    When it comes to making access decisions, it’s all about being smart. In the speed of today’s business agility requirements, we cannot stop users at the door all the time and ask for their ID. We need to know them. Intelligent Authentication provides the benefit of reducing friction AND adding security to protect applications and data that are critical to the business. It provides security and convenience, considering the needs of the modern workforce. In this session we will discuss a simple process to gain visibility into the right listening posts, derive actionable insights and then drive action to protect the organization’s most valuable assets from rogue access and drive Identity Assurance.
  • RSA #2 - Transforming Secure Access to be Pervasive - 5 Ways to Transform Access Recorded: Nov 30 2018 55 mins
    Tony Karam, Identity Product Marketing, RSA
    Ever heard the expression, “you can’t hit what you can’t see?” Well that sentiment rings true when it comes to protecting access to critical resources. You can only secure what you actually take steps to protect. .As such, secure access needs to be pervasive and cover all access user cases, regardless of whether applications and resources live on-premises or in the cloud. And because it’s likely have both, you need a solution that works equally well across these hybrid environments. In this session we will explore five critical secure access use cases, and how you can achieve a high-level of identity assurance that users are who that claim to be so that you can avoid falling victim to the next wave of credential-based attacks.
  • PAM: The Critical Missing Piece in Your Security Strategy Recorded: Nov 22 2018 63 mins
    Brandon Dunlap, Moderator, (ISC)², Karl Lankford, Lead Solutions Engineer EMEA, Bomgar
    Industry thought leaders have stated that if you can only tackle one project to improve the security of your organisation it should be Privileged Access Management (PAM). Our own research backs this up with the 2018 Privileged Access Threat Report revealing organizations using automated PAM technology experience far fewer serious breaches than those that did not. Karl Lankford, Lead Solutions Engineer EMEA at Bomgar will discuss what ‘privilege’ means to your business and how implementing a PAM solution can drive significant improvements across the organisation. You will learn:

    •Why organisations should make PAM their top 2019 investment
    •Why quickly controlling and automating key PAM capabilities is critical to your organisation’s success
    •Help you to prepare the business case for your PAM project and to get Executive Leadership buy in
  • The Workforce Gap Widens: The Need to Focus on Skills Development Recorded: Nov 20 2018 59 mins
    John McCumber, Director of Cybersecurity Advocacy, North America, (ISC)2
    The 2018 (ISC)² Cybersecurity Workforce Study finds the cybersecurity skills shortage continues to grow. But the news isn’t all doom and gloom. Our latest deep dive into the issues and challenges facing cybersecurity professionals adopts a new approach to more broadly define the cybersecurity workforce. The study reveals a relatively satisfied, younger and more diverse field of practitioners focused on developing their skills and advancing their careers. Join (ISC)² Director of Cybersecurity Advocacy, North America, John McCumber On November 20, 2018 at 1:00PM Eastern as we examine how practitioners are dealing with the workforce gap while balancing skills development, hiring priorities and everyday threats they face.
  • RSA #1 - Transforming Secure Access to be Convenient Recorded: Nov 16 2018 52 mins
    Murtaza Hafizji, Sr. Product Mktg Mgr, ID & Access Assurance, RSA; Brandon Dunlap (Moderator)
    The market demands for the modern approach to authentication is more like “Have it your way!” That’s why many of the approaches and offerings can only do one thing. Those apps will become obsolete or acquired as Access Management vendors will face the complex reality that enterprises who want modern authentication will also want access that’s convenient, intelligent and pervasive – not just 2FA or SSO. In this webinar, RSA will examine how to leverage a trusted, secure access platform that provides access to all users, to all apps from anywhere at any time in a smart, secure and noninvasive way.
  • Gigamon 3 - Threat Hunting: Objectively Measuring Value Recorded: Nov 1 2018 57 mins
    Justin Kohler, Sen Dir, Customer Success, Gigamon; Patrick Perry, Technical Acct Mgr, Gigamon Insight; Brandon Dunlap
    Someone in leadership always seems to ask the question “How can I tie my threat hunting activities to real impacts for the organization?” Threat hunting programs are encouraged as part of a mature and successful incident response capability and teams invest significant time and effort in the development and maintenance of that program. However, management is always looking for metrics to demonstrate the value of threat hunting in real terms due to the number of hours consumed by such highly skilled professionals. It’s a big investment. Join Gigamon on November 1, 2018 at 1:00PM Eastern for an examination of how to demonstrate value from threat hunting operations with practical methods and examples for tracking hunting operations, reporting and attributing outcomes to industry-leading frameworks and plot hunting goals and coverage across the MITRE ATT&CK framework.
  • Has Your Network Packet Broker Evolved with Your Infrastructure? Recorded: Oct 18 2018 60 mins
    Sam Kumarsamy, Senior Product Marketing Manager, Gigamon; Brandon Dunlap (Moderator)
    As your infrastructure has grown to include a mix of physical, virtual and cloud environments with increased network speeds and volume of data, so have the threats increased to your attack surface with more vectors to breach your organization. This challenges your network and security operation teams and tour traditional network packet broker needs to evolve from providing network visibility to also helping strengthen your security posture. Join Gigamon and (ISC)2 on October 18, 2018 at 1:00PM Eastern where we will examine the acquisition and aggregation of data from your physical, virtual and cloud infrastructure, filtering of traffic to provide the right data to the right tools, transforming your data with masking, header stripping and SSL decryption (TLS1.3) to ensure compliance, threat prioritization by providing context and bridging the gap between NetOps and SecOps.
(ISC)2 Security Briefings - In-depth examination of infosec topics.
(ISC)2 Security Briefings brings attendees multi-part series on cutting edge infosecurity topics that gets deeper into the subject matter and technologies presented by subject matter experts.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Infoblox #3: DNS….. One of the Best Weapons for Securing Networks?
  • Live at: Mar 21 2019 5:00 pm
  • Presented by: Chris Kissel, IDC, Research Director, Worldwide Security Products; Dawn Bedard, Sen Technologist; Elevi Assocs; B. Dunlap
  • From:
Your email has been sent.
or close