The Security and Compliance Impact of DNS Level
Visibility, Threat Intelligence, and Control
Infoblox is hosting a three-part webinar series on the role of their foundational security in achieving security operations, compliance and effectiveness objectives.
Register for one or more of the upcoming sessions. Earn up to 3 CPE credits!
|Session 1: Thursday, May 28, 2020 | 2:00pm ET; 11:00am PT|
|Improving Security Ops Through Automation and Visibility Optimization|
Attackers go to great efforts to disguise and obfuscate malicious activity from detection. This not only complicates detection but makes it extremely difficult to collect enough information and context for fast, effective threat investigation and incident response. DNS, however, is a rich threat investigation resource for revealing infection, lateral movement, C2 calls, and other malicious or anomalous activity.
This webinar will highlight some of the time and cost savings potential of threat visibility and security automation with examples using Infoblox DNS, DHCP, and IPAM (DDI) information and capabilities to:
- Automate actions such as triggering a vulnerability scan or auto-generating a service ticket for improved routing, response, and tracking
- Reduce time and costs associated with SIEM investigations by filtering duplicate data and extraneous noise around an event
- Maximize contextual visibility surrounding an event including access to user, device, and other details
|Session 2: Thursday, June 18, 2020 | 2:00pm ET; 11:00am PT|
|Maximizing Threat Intelligence Value|
The term ‘threat intelligence’ is used to address different kinds of information needed for different scenarios. Effective threat prevention and detection solutions, like NGFW, SWG or EDR, are only as good as the threat intelligence driving their analysis. Efficient incident investigation and threat response require the kind of threat intelligence that highlights the objectives, methods, and tactics used by the currently suspected attack to help them more quickly and accurately validate or eliminate that possibility.
This webinar will highlight Infoblox capabilities at both ends of the threat intelligence spectrum including:
- Collecting, correlating, and sharing a ‘super-set’ of threat intelligence for a stronger defense across the entire attack surface
- Assessing the value of various threat feeds for detection, investigation, and hunting
- Leveraging Infoblox public threat research resources and subscription Dossier services
|Session 3: Thursday, July 16, 2020 | 2:00pm ET; 11:00am PT|
|Help Demonstrating NIST Compliance and Alignment Using Infoblox|
Changes in technology and the threat landscape require constant reassessment, and realignment, against the NIST Cybersecurity Framework (CSF).
This webinar will highlight how Infoblox leverages DNS, DHCP, and IP Address Management (collectively, ‘DDI’) to provide unique visibility, automation, and control capabilities to help across NISTs’ core Identify, Protect, Detect, and Respond functions. Among the topics to be reviewed are:
- Continuous monitoring of threat activity at the DNS level, invisible to most other defenses
- Auto-discovery of endpoints, servers, routers, switches, IoT and other devices
- Streamlining and automatic threat investigation with threat intelligence and DDI context
- Integrating threat intelligence and multiple 3rd party tools for greater effectiveness and efficiency