9 Can't-Miss Sessions at RSA

Two years in a row, RSA will be a very unique experience. This time, it’s going completely digital Here are the sessions we’re looking forward to most. And if you’re not registered yet, scroll to the bottom for a free Digital Expo code where you’ll get access to some of the events below.

(And don’t skip the DNSFilter virtual booth!)

  1. Attack & Defend: Protecting Modern Distributed Applications and Components

Most modern companies have a multi-product tech stack, that is often held together by

hundreds of different libraries with external APIs and code loaded at run time. Attacks against this fragile software supply chain are becoming very common. This back to basics session will show in an interactive attack/defend session how the current attacks against these applications work, and how to correctly apply the defenses against them. Jason Lam, Certified Instructor from the SANS Institute will lead the session in a classroom style environment.

  1. Global Threat Brief: Hacks and Adversaries Unveiled

Geopolitical and cybersecurity expert Dmitri Alperovitch joins Sandra Joyce, EVP at FireEye to discuss new and novel attacks and the individuals and criminal organizations behind them. Behind every threat is a real human - who are they, and what do they want? This keynote is sure to be entertaining and illuminating.

  1. Ransomware: Creation, Detection, and Response

Ransomware is one of the fastest growing categories of malware, and one of the most costly. The average cost of a ransomware attack is now more than $300,000. Attendees will learn how it is made, common characteristics, behaviors, and how an author can quickly evade antivirus signatures as well as how to fight back with novel detection and incident response techniques tailored from numerous ransomware engagements with live actors.

  1. Critical DNS & Domain Name Security Intelligence to Thwart Cyberattacks

Adopting key security protocols for domain names and DNS has become critical with growth in business email compromise (BEC) and phishing attacks. Learn about the threats associated with poor management of these digital assets and ensure there are no missing links in security postures. This session will provide eye-opening research findings on the severity of this problem.

  1. Hindsight is 20/20: The Impact of Trends on the Digital Threat Landscape

Hackers and bad actors are clever, and they often leverage what’s top of mind in the news cycle. Trending topics like COVID-19, the capitol riots, and TikTok were all used in 2020 to cloak malicious domain usage. DNSFilter CEO, Ken Carnesi, looks at some of the sneakiest, and most topical threats, we blocked in 2020, and how you can leverage your network insights to stop emerging threats.

  1. Invisible Security: Protecting Users with No Time to Spare

Average users can’t afford to devote time to security. Invisible security, which occurs automatically and transparently, may help. This session will explore examples consistent with this approach in existence today, including protective DNS and automatic updates, describing how invisible defenses may aid potential beneficiaries in health care, the defense industrial base, and the general public.

  1. Mapping your journey to zero trust in the everywhere workspace

Today’s Everywhere Workplace promises your employees unprecedented levels of freedom. Yet threat actors see this as an opportunity to attack, creating a challenging environment for IT. Join Ivanti cybersecurity experts as they share best practices on implementing zero trust security at the user, device and network levels to ensure an optimal security posture for your organization.

  1. Frictionless Zero Trust: Top 5 Tips For CISOs

This session benefits organizations challenged in getting started or developing an evidence based approach to maturing Zero Trust security - without the friction. We reveal the top 5 best practices for starting and maturing a frictionless Zero Trust initiative. Using industry recognized models, we will share practical, proven best practices and tools to accelerate your Zero Trust journey.

  1. Top Active Directory Attacks: Understand, then Prevent and Detect

Today's enterprise depends on security professionals having an understanding of Active Directory? This talk will review the most common, over-powered attacks that hackers are using now. Attendees will learn how to lock these attacks down, and perhaps most important, learn to detect when attackers are trying. Attackers don't get points for new attacks. Learn what they use, lock it down, and detect it.


Check out our CEO's video from RSA to see him discuss cybersecurity and DNS filtering network data.

Search
  • There are no suggestions because the search field is empty.
Latest posts
Ensuring CIPA Compliance: A Practical Guide (and checklist) for Educational Leaders Ensuring CIPA Compliance: A Practical Guide (and checklist) for Educational Leaders

The Children's Internet Protection Act (CIPA) is a critical law designed to ensure that students are protected from harmful online content. It requires schools and libraries to implement Internet safety measures, such as filtering and monitoring, to safeguard minors. Compliance with CIPA is essential for institutions seeking E-Rate program discounts for Internet access and internal connections.

The Power of Customer Experience The Power of Customer Experience

Customer experience is the secret sauce that sets successful Managed Service Providers (MSPs) apart from the rest. In a market teeming with competition, you need more than offering the best technology or the lowest prices. It's about how clients feel when they interact with your services. A stellar customer experience can transform a one-time client into a loyal advocate, while a poor one can send them running to your competitors. According to a ...

Enhancing Security for In-Store Wi-Fi: How to make convenience safe for all Enhancing Security for In-Store Wi-Fi: How to make convenience safe for all

As demand grows for constant connectivity to the digital world, offering free Wi-Fi has become as essential for restaurants and retail stores as providing quality products and exceptional service. Customers increasingly expect to stay connected wherever they go, and the availability of Wi-Fi in restaurants, shopping malls, and retail outlets significantly influences their choice of where to dine and shop. For businesses, providing in-store Wi-Fi ...

Explore More Content

Ready to brush up on something new? We've got even more for you to discover.