Recent studies indicate that only 12% of organizations that take a do-it-yourself approach to DDI (DNS, DHCP, IP Address Management) are actively monitoring and analyzing their DNS Activity and Queries to reduce/mitigate threats, or to aid in post-breach threat analysis.
In this session, participants will learn how to leverage their DDI data to reduce risk and complete their “zero trust network architecture” models. Participants will learn the value of monitoring internal DNS traffic, and how to take advantage of the often overlooked, yet powerful treasure trove of query logs that contain deep insights to their network traffic.
Those who are new to DDI in a Security or Cloud role, as well as experienced DDI practitioners will learn from production-depl ...