9 Can't-Miss Sessions at RSA

Two years in a row, RSA will be a very unique experience. This time, it’s going completely digital Here are the sessions we’re looking forward to most. And if you’re not registered yet, scroll to the bottom for a free Digital Expo code where you’ll get access to some of the events below.

(And don’t skip the DNSFilter virtual booth!)

  1. Attack & Defend: Protecting Modern Distributed Applications and Components

Most modern companies have a multi-product tech stack, that is often held together by

hundreds of different libraries with external APIs and code loaded at run time. Attacks against this fragile software supply chain are becoming very common. This back to basics session will show in an interactive attack/defend session how the current attacks against these applications work, and how to correctly apply the defenses against them. Jason Lam, Certified Instructor from the SANS Institute will lead the session in a classroom style environment.

  1. Global Threat Brief: Hacks and Adversaries Unveiled

Geopolitical and cybersecurity expert Dmitri Alperovitch joins Sandra Joyce, EVP at FireEye to discuss new and novel attacks and the individuals and criminal organizations behind them. Behind every threat is a real human - who are they, and what do they want? This keynote is sure to be entertaining and illuminating.

  1. Ransomware: Creation, Detection, and Response

Ransomware is one of the fastest growing categories of malware, and one of the most costly. The average cost of a ransomware attack is now more than $300,000. Attendees will learn how it is made, common characteristics, behaviors, and how an author can quickly evade antivirus signatures as well as how to fight back with novel detection and incident response techniques tailored from numerous ransomware engagements with live actors.

  1. Critical DNS & Domain Name Security Intelligence to Thwart Cyberattacks

Adopting key security protocols for domain names and DNS has become critical with growth in business email compromise (BEC) and phishing attacks. Learn about the threats associated with poor management of these digital assets and ensure there are no missing links in security postures. This session will provide eye-opening research findings on the severity of this problem.

  1. Hindsight is 20/20: The Impact of Trends on the Digital Threat Landscape

Hackers and bad actors are clever, and they often leverage what’s top of mind in the news cycle. Trending topics like COVID-19, the capitol riots, and TikTok were all used in 2020 to cloak malicious domain usage. DNSFilter CEO, Ken Carnesi, looks at some of the sneakiest, and most topical threats, we blocked in 2020, and how you can leverage your network insights to stop emerging threats.

  1. Invisible Security: Protecting Users with No Time to Spare

Average users can’t afford to devote time to security. Invisible security, which occurs automatically and transparently, may help. This session will explore examples consistent with this approach in existence today, including protective DNS and automatic updates, describing how invisible defenses may aid potential beneficiaries in health care, the defense industrial base, and the general public.

  1. Mapping your journey to zero trust in the everywhere workspace

Today’s Everywhere Workplace promises your employees unprecedented levels of freedom. Yet threat actors see this as an opportunity to attack, creating a challenging environment for IT. Join Ivanti cybersecurity experts as they share best practices on implementing zero trust security at the user, device and network levels to ensure an optimal security posture for your organization.

  1. Frictionless Zero Trust: Top 5 Tips For CISOs

This session benefits organizations challenged in getting started or developing an evidence based approach to maturing Zero Trust security - without the friction. We reveal the top 5 best practices for starting and maturing a frictionless Zero Trust initiative. Using industry recognized models, we will share practical, proven best practices and tools to accelerate your Zero Trust journey.

  1. Top Active Directory Attacks: Understand, then Prevent and Detect

Today's enterprise depends on security professionals having an understanding of Active Directory? This talk will review the most common, over-powered attacks that hackers are using now. Attendees will learn how to lock these attacks down, and perhaps most important, learn to detect when attackers are trying. Attackers don't get points for new attacks. Learn what they use, lock it down, and detect it.


Check out our CEO's video from RSA to see him discuss cybersecurity and DNS filtering network data.

Search
  • There are no suggestions because the search field is empty.
Latest posts
2025 Cybersecurity Predictions: It’s Not Just AI, Here’s How Cybersecurity Will be Transformed in 2025 2025 Cybersecurity Predictions: It’s Not Just AI, Here’s How Cybersecurity Will be Transformed in 2025

Earlier this month I joined Mikey Pruitt, our Global Partner Evangelist, on the DNSFilter podcast dnsUNFILTERED to discuss my 2025 cybersecurity predictions. We had a lot of fun and covered all of the points I’ll outline here, but I wanted to go deeper. My 30 years of cybersecurity experience have given me a strong sense of where we’re heading as an industry—the shift to the cloud in many ways is a precursor in the adoption of AI and the future...

From Reactive to Proactive: How to Create a DNS Security Strategy that Stops Attacks From Reactive to Proactive: How to Create a DNS Security Strategy that Stops Attacks

Most businesses only think about DNS security after an attack has already occurred. By then, the damage is done - downtime, lost revenue, compromised data, and a tarnished reputation. In an environment where cyber threats are constantly evolving, a reactive approach to DNS security simply isn’t enough.

How MSPs Can Enhance Customer Experience with Technology How MSPs Can Enhance Customer Experience with Technology

Customer experience is the secret sauce that sets successful Managed Service Providers (MSPs) apart from the rest. In a market teeming with competition, you need to offer more than the best technology or the lowest prices. It's about how clients feel when they interact with your services. A stellar customer experience can transform a one-time client into a loyal advocate, while a poor one can send them running to your competitors. According to a ...

Explore More Content

Ready to brush up on something new? We've got even more for you to discover.