9 Can't-Miss Sessions at RSA

9 Can't-Miss Sessions at RSA

Jillian Kossman
May 13, 2021

Two years in a row, RSA will be a very unique experience. This time, it’s going completely digital Here are the sessions we’re looking forward to most. And if you’re not registered yet, scroll to the bottom for a free Digital Expo code where you’ll get access to some of the events below.

(And don’t skip the DNSFilter virtual booth!)

  1. Attack & Defend: Protecting Modern Distributed Applications and Components

Most modern companies have a multi-product tech stack, that is often held together by

hundreds of different libraries with external APIs and code loaded at run time. Attacks against this fragile software supply chain are becoming very common. This back to basics session will show in an interactive attack/defend session how the current attacks against these applications work, and how to correctly apply the defenses against them. Jason Lam, Certified Instructor from the SANS Institute will lead the session in a classroom style environment.

  1. Global Threat Brief: Hacks and Adversaries Unveiled

Geopolitical and cybersecurity expert Dmitri Alperovitch joins Sandra Joyce, EVP at FireEye to discuss new and novel attacks and the individuals and criminal organizations behind them. Behind every threat is a real human - who are they, and what do they want? This keynote is sure to be entertaining and illuminating.

  1. Ransomware: Creation, Detection, and Response

Ransomware is one of the fastest growing categories of malware, and one of the most costly. The average cost of a ransomware attack is now more than $300,000. Attendees will learn how it is made, common characteristics, behaviors, and how an author can quickly evade antivirus signatures as well as how to fight back with novel detection and incident response techniques tailored from numerous ransomware engagements with live actors.

  1. Critical DNS & Domain Name Security Intelligence to Thwart Cyberattacks

Adopting key security protocols for domain names and DNS has become critical with growth in business email compromise (BEC) and phishing attacks. Learn about the threats associated with poor management of these digital assets and ensure there are no missing links in security postures. This session will provide eye-opening research findings on the severity of this problem.

  1. Hindsight is 20/20: The Impact of Trends on the Digital Threat Landscape

Hackers and bad actors are clever, and they often leverage what’s top of mind in the news cycle. Trending topics like COVID-19, the capitol riots, and TikTok were all used in 2020 to cloak malicious domain usage. DNSFilter CEO, Ken Carnesi, looks at some of the sneakiest, and most topical threats, we blocked in 2020, and how you can leverage your network insights to stop emerging threats.

  1. Invisible Security: Protecting Users with No Time to Spare

Average users can’t afford to devote time to security. Invisible security, which occurs automatically and transparently, may help. This session will explore examples consistent with this approach in existence today, including protective DNS and automatic updates, describing how invisible defenses may aid potential beneficiaries in health care, the defense industrial base, and the general public.

  1. Mapping your journey to zero trust in the everywhere workspace

Today’s Everywhere Workplace promises your employees unprecedented levels of freedom. Yet threat actors see this as an opportunity to attack, creating a challenging environment for IT. Join Ivanti cybersecurity experts as they share best practices on implementing zero trust security at the user, device and network levels to ensure an optimal security posture for your organization.

  1. Frictionless Zero Trust: Top 5 Tips For CISOs

This session benefits organizations challenged in getting started or developing an evidence based approach to maturing Zero Trust security - without the friction. We reveal the top 5 best practices for starting and maturing a frictionless Zero Trust initiative. Using industry recognized models, we will share practical, proven best practices and tools to accelerate your Zero Trust journey.

  1. Top Active Directory Attacks: Understand, then Prevent and Detect

Today's enterprise depends on security professionals having an understanding of Active Directory? This talk will review the most common, over-powered attacks that hackers are using now. Attendees will learn how to lock these attacks down, and perhaps most important, learn to detect when attackers are trying. Attackers don't get points for new attacks. Learn what they use, lock it down, and detect it.


Check out our CEO's video from RSA to see him discuss cybersecurity and DNS filtering network data.

Search
MORE Cybersecurity

Cybersecurity Report Mid-year 2022

Inside this report, you’ll see there’s been significant increases in botnet, DDoS, and phishing attacks, often on critical systems and infrastructure.

Get the Report

SIEM Integration with Data Export Feature

Data Export feature allows customers to transmit DNS query data from DNSFilter to an external location in real-time.

Learn More about Data Export

Lifesaver Program

Current OpenDNS customers get FREE DNS security through September 2022 when you commit to a 1-year deal with DNSFilter.

Get More Details
LATEST POSTS

How to Spot a Nation-State Cyber Attack

From cyber espionage to cyber terrorism, cybercriminals now pose a significant threat to national security and public safety.

"MSP Friendly, Intuitive, Powerful" — ArcLight Case Study

ArcLight Solutions is a longstanding MSP primarily working with healthcare clients, rural hospitals and private practices.

Compliance ≠ Security: Healthcare Organizations’ Biggest Threats

Compliance and security are not the same. And in healthcare, this difference is incredibly important. Checking off compliance boxes will not ensure patient data

Explore More Content

Ready to brush up on something new? We've got even more for you to discover.