Data is at the core of every business, and theft of sensitive or regulated data and intellectual property is one of the most serious risks enterprises face. According to a 2015 Ponemon Institute study, the average consolidated cost of a data breach is $3.8 million, which includes investigative and forensic efforts, resolution, and the consequences of customer defection. High profile breaches in recent months have crossed the $100 million mark in total cost.
Hackers often use DNS as a pathway for exfiltrating data to avoid detection by standard security controls that primarily focus on the web and email. They can accomplish this using standard DNS tunneling toolkits- -or custom techniques that are far more sophisticated, low and slow, and harder to detect. Mitigating these threats effectively requires applying the right technique based on the exfiltration method used.
Join us at 11 am on Tuesday, Oct. 13 for a webinar, co-sponsored by SC magazine, entitled Don’t Let Sensitive Data Hitch a Ride out of Your Network. You’ll learn about:
- Data theft and what’s in it for the hackers
- Various ways data can be stolen over DNS
- Mitigation techniques for DNS tunneling and data exfiltration
Traditional security controls don’t effectively secure DNS, and closing this critical gap is key to protecting your data. DNS is ubiquitous, and close to your endpoints. Attend this webinar and find out how you can use DNS as an optimal detection and enforcement point to strengthen your network security.
To register, click here.