Consulting Systems Engineer
Whether targeted or opportunistic, online threats are becoming increasingly sophisticated and evasive. However, unlike attack vectors, the infrastructures used to launch the malicious campaigns cannot be concealed.
But what if one could use the analysis of DNS traffic to reveal these infrastructures and turn this information into threat intelligence used not only to protect, but also to predict the next moves of attackers?
In this session see how real world examples will explain the details of a predictive approach, which tackles the malware from an infrastructure perspective and overtakes the limitations of traditional technologies.
At the end of this session, participants will learn that:
1 It is possible to use the large scale intelligence to mitigate Advanced Threats, whether they are targeted or opportunistic.
2 It is possible to pivot through the infrastructures used by criminals, discover where the attacks are staged, and block them before they are launched on a large scale.
3 The protection is extremely simple to enforce since it leverages the ubiquity of the DNS protocol.
4 The protection can be seamlessly extended outside the physical perimeter of the organization.