Overview
Syllabus
0:00 - Need for consistent security across hybrid, multi-cloud, and on-prem environments
00:03:57 - Limitations of Traditional React-Detect-Respond Security Models
00:04:42 - Assume Breach Mindset and Containment Strategies
00:05:19 - Continuous Monitoring and Network Segmentation
00:07:10 - Detecting Data Exfiltration, DNS Tunneling, and Zero-Day Attacks
00:07:20 - Importance of Continuous DNS Monitoring in Trust and Security
00:11:39 - Device-Level Enforcement in ZT-DNS for Windows Servers
00:13:07 - Operational Flow Example of ZT-DNS Implementation
00:14:24 - Engagement with Infoblox Community and Closing Remarks
Taught by
Microsoft Ignite