Combatting cyber-threats at scale
How can information security leaders address the widespread and fast-changing cyber-threat landscape?
Cyber-security has evolved into an industrial-scale problem. There are far too many scams for security teams to keep up with. Threats are always changing. Shifting IT architectures, such as the move to the cloud and the integration of AI, are creating new threats.
The traditional approach to cyber-security has been to react to individual threats, such as new malware variants, as they arise. But these reactive approaches no longer work in the face of a tsunami of threats. Security leaders require an at-scale solution that provides a proactive method of getting ahead of the cyber-criminals before they cause damage.
Such an approach is made possible by targeting the underlying web infrastructure criminals use: IP address and DNS data. Threat intelligence from DNS data is extremely powerful, but is often ignored by security teams for several reasons: it is constant, low levels of data are carried, DNS data is critical to operations, and it is generally trusted.
Criminals use DNS data in many ways to exfiltrate data. However, analysing this data can identify suspicious traffic that would otherwise go unremarked. This is a highly effective strategy: the criminal “middlemen” used by many hackers are mostly well known and the way they engage with the DNS system, such as registering multiple URLs, can be monitored. With machine learning and analytics this data can trigger automatic responses with negligible levels of false positives.
Join us to network with your peers and gain practical insights into strategies for combatting cyber-threats at-scale and getting ahead of the hackers. This is an exclusive event and seat numbers are very limited, so apply for your place now.
The topics we will explore
During the meeting we will focus on questions such as:
- Why are traditional reactive security methods ineffective at a time of industrialised cyber-threats? How can security teams change from reactive to proactive?
- Why is it important to move from combatting individual threats to engaging with the infrastructure that cyber-criminals use?
- What is the significance of DNS traffic and registrations to cyber-security? How can threat intelligence based on DNS data strengthen security postures?
- How can AI assist security leaders by automating threat detection? What is the likely effect on false positive and false negative rates if AI is used to combat threats?
Who is invited?
This breakfast event is designed for senior decision makers across industry who wish to discuss how to combat malware and other cyber-threats at scale. Delegates will be employed as CISOs, CIOs and other senior cyber-security decision makers in large (500+ employees) organisations in the private sector.
Be one of 12 senior information security professionals attending the event at The Goring Hotel in central London. For any enquiries, please contact Mergim on 020 8349 6458 or email m.begolli@business-reporter.co.uk.
The breakfast discussion is brought to you by Infoblox and is only for senior executives as described above. Registrations of junior professionals, consultants, solution providers or other sellers to this market won’t be accepted. To be eligible you must be employed by a corporate legal entity such as a private company: if you are a sole trader or in a partnership other than a legally incorporated one, we will be unable to offer you a place.
This event is free of charge to attend.
When you register, we will ask you for your corporate email address which we will share only with the event sponsor(s). See our privacy policy.