9 Can't-Miss Sessions at RSA

Two years in a row, RSA will be a very unique experience. This time, it’s going completely digital Here are the sessions we’re looking forward to most. And if you’re not registered yet, scroll to the bottom for a free Digital Expo code where you’ll get access to some of the events below.

(And don’t skip the DNSFilter virtual booth!)

  1. Attack & Defend: Protecting Modern Distributed Applications and Components

Most modern companies have a multi-product tech stack, that is often held together by

hundreds of different libraries with external APIs and code loaded at run time. Attacks against this fragile software supply chain are becoming very common. This back to basics session will show in an interactive attack/defend session how the current attacks against these applications work, and how to correctly apply the defenses against them. Jason Lam, Certified Instructor from the SANS Institute will lead the session in a classroom style environment.

  1. Global Threat Brief: Hacks and Adversaries Unveiled

Geopolitical and cybersecurity expert Dmitri Alperovitch joins Sandra Joyce, EVP at FireEye to discuss new and novel attacks and the individuals and criminal organizations behind them. Behind every threat is a real human - who are they, and what do they want? This keynote is sure to be entertaining and illuminating.

  1. Ransomware: Creation, Detection, and Response

Ransomware is one of the fastest growing categories of malware, and one of the most costly. The average cost of a ransomware attack is now more than $300,000. Attendees will learn how it is made, common characteristics, behaviors, and how an author can quickly evade antivirus signatures as well as how to fight back with novel detection and incident response techniques tailored from numerous ransomware engagements with live actors.

  1. Critical DNS & Domain Name Security Intelligence to Thwart Cyberattacks

Adopting key security protocols for domain names and DNS has become critical with growth in business email compromise (BEC) and phishing attacks. Learn about the threats associated with poor management of these digital assets and ensure there are no missing links in security postures. This session will provide eye-opening research findings on the severity of this problem.

  1. Hindsight is 20/20: The Impact of Trends on the Digital Threat Landscape

Hackers and bad actors are clever, and they often leverage what’s top of mind in the news cycle. Trending topics like COVID-19, the capitol riots, and TikTok were all used in 2020 to cloak malicious domain usage. DNSFilter CEO, Ken Carnesi, looks at some of the sneakiest, and most topical threats, we blocked in 2020, and how you can leverage your network insights to stop emerging threats.

  1. Invisible Security: Protecting Users with No Time to Spare

Average users can’t afford to devote time to security. Invisible security, which occurs automatically and transparently, may help. This session will explore examples consistent with this approach in existence today, including protective DNS and automatic updates, describing how invisible defenses may aid potential beneficiaries in health care, the defense industrial base, and the general public.

  1. Mapping your journey to zero trust in the everywhere workspace

Today’s Everywhere Workplace promises your employees unprecedented levels of freedom. Yet threat actors see this as an opportunity to attack, creating a challenging environment for IT. Join Ivanti cybersecurity experts as they share best practices on implementing zero trust security at the user, device and network levels to ensure an optimal security posture for your organization.

  1. Frictionless Zero Trust: Top 5 Tips For CISOs

This session benefits organizations challenged in getting started or developing an evidence based approach to maturing Zero Trust security - without the friction. We reveal the top 5 best practices for starting and maturing a frictionless Zero Trust initiative. Using industry recognized models, we will share practical, proven best practices and tools to accelerate your Zero Trust journey.

  1. Top Active Directory Attacks: Understand, then Prevent and Detect

Today's enterprise depends on security professionals having an understanding of Active Directory? This talk will review the most common, over-powered attacks that hackers are using now. Attendees will learn how to lock these attacks down, and perhaps most important, learn to detect when attackers are trying. Attackers don't get points for new attacks. Learn what they use, lock it down, and detect it.


Check out our CEO's video from RSA to see him discuss cybersecurity and DNS filtering network data.

Search
  • There are no suggestions because the search field is empty.
Latest posts
Tycoon 2FA Infrastructure Expansion: A DNS Perspective, and Release of 65 Root Domain IOCs Tycoon 2FA Infrastructure Expansion: A DNS Perspective, and Release of 65 Root Domain IOCs

Our analysis of Tycoon 2FA infrastructure has revealed significant operational changes, including the platform's coordinated expansion surge in Spanish (.es) domains starting April 7, 2025, and evidence suggesting highly targeted subdomain usage patterns. This blog shares our findings from analyzing 11,343 unique FQDNs (fully qualified domain names) and provides 65 root domain indicators of compromise (IOCs) to help network defenders implement mo...

The Best Content Filter Software Checklist: A Buyer's Guide to DNS-Level Protection The Best Content Filter Software Checklist: A Buyer's Guide to DNS-Level Protection

Staying Ahead with Smarter Web Filtering

Across every industry and network environment, content filtering isn’t just a matter of productivity, it’s a front line of defense. From malware and phishing to compliance risks and productivity drains, the threats are real, and the stakes are high.

Smarter DNS Policies: What You Should Be Blocking (But Probably Aren’t) Smarter DNS Policies: What You Should Be Blocking (But Probably Aren’t)

DNS filtering is a foundational layer of defense and helps to fortify the strongest security stacks. Most organizations use DNSFilter to block the obvious: malware, phishing, and adult content. That’s a great start, but many are missing out on the broader potential of DNS policies.

Explore More Content

Ready to brush up on something new? We've got even more for you to discover.