Attack of Zones
Discover the protocol being used for 92% of cyberattacks that more than 42% of organizations overlook in spite of it being foundational to all networks. This session will show how you can get more out of your existing security stack by taking a more proactive approach to unclassified threats. This shift-left approach reduces the ever-increasing pressure facing security teams by arming them with unparalleled intelligence before threats can impact the network and organisation.
- How something that already exists on every network can help security teams
2.That DNS shouldn't be seen as the sole domain of networking/server teams
3.How DNS can map to frameworks like MITRE
- The techniques that enable proactive defense and reduced time to investigate
- What a “shift left” security approach means