There is so much that can go wrong with your Active Directory: AD is a top target for attackers because it provides the keys to your IT kingdom, and even unintentional errors by users or admins can lead to a breach or downtime. There is no such thing as a secure enterprise, so it is essential to have both preventative measures and threat detection & response mechanisms in place — in short, to plan for a breach.
Join us for an in-depth look at the sophisticated tactics, techniques and procedures (TTPs) that attackers employ to compromise credentials and data.
In this 40-minute session, we explain and demonstrate all key phases of the cyber kill chain, including discovery, privilege escalation, lateral movement and persistence.
In the process, you will learn how to detect and mitigate powerful TTPs:
Adam Rosen is an expert on managing and securing data, Adam has helped organisations of all sizes implement controls and policies to meet security, compliance, and efficiency objectives. In his current capacity, he manages Netwrix’ portfolio of data security and data privacy technologies depended on by enterprises around the world to protect their most critical information.
Alex McCoy is a PreSales Engineer with seven years of experience working at Stealthbits Technologies, now part of Netwrix. Alex specialises in Active Directory and Data Access Governance projects helping customers assess and cleanup Active Directory and unstructured/structured data repositories.
A single improper change to an AD object can seriously damage both performance and security — so you need a solution that empowers you to quickly pinpoint and roll back those modifications. More broadly, you need to be able to spot suspicious behaviour in time to prevent costly breaches and downtime.
During the webinar, we’ll show you how you can:
Being a native of Germany, he brings more than 25 years of delivering IT security expertise at a global scale. His work focuses on advancing cyber resilience as a sophisticated, new approach to tackle cyber-attacks faced by governments and organisations of all sizes for the handling of change and vulnerability as the two main issues to address in information security. He has published numerous articles in German and English about the need to address change and vulnerability to achieve cyber resilience, drawing on his experience and certifications as CISSP (ISC²) and CISM (ISACA).
Kent has over 25 years’ experience in the Technology field, training in formal classroom situations and achieving extensive deliverables of specific tasks in frequently high pressure environments. He has prepared course materials and taught classes related to network security, network administration, and network engineering. Specialises in Microsoft platforms.