Webinar series

Active Directory Security Masterclass Series:

Planning for a Breach

Get Free Webinar Series
{{ firstError }}
We care about security of your data.
Privacy Policy

There is so much that can go wrong with your Active Directory: AD is a top target for attackers because it provides the keys to your IT kingdom, and even unintentional errors by users or admins can lead to a breach or downtime. There is no such thing as a secure enterprise, so it is essential to have both preventative measures and threat detection & response mechanisms in place — in short, to plan for a breach.

Register for the webinar
Detecting and Mitigating Active Directory Attacks
{{ firstError }}
We care about security of your data.
Privacy Policy
Register for the webinar
If the Breach Comes: Defend & Recover Your AD
{{ firstError }}
We care about security of your data.
Privacy Policy

Detecting and Mitigating Active Directory Attacks

Join us for an in-depth look at the sophisticated tactics, techniques and procedures (TTPs) that attackers employ to compromise credentials and data.

In this 40-minute session, we explain and demonstrate all key phases of the cyber kill chain, including discovery, privilege escalation, lateral movement and persistence.

In the process, you will learn how to detect and mitigate powerful TTPs:​​​​​​

  • LDAP reconnaissance
  • Pass-the-Hash attacks
  • password extraction from NTDS.dit
    and more

Webinar Presenters

Adam Rosen avatar
Adam Rosen
VP of Product Strategy

Adam Rosen is an expert on managing and securing data, Adam has helped organisations of all sizes implement controls and policies to meet security, compliance, and efficiency objectives. In his current capacity, he manages Netwrix’ portfolio of data security and data privacy technologies depended on by enterprises around the world to protect their most critical information.

Alex McCoy avatar
Alex McCoy
Solutions Engineer

Alex McCoy is a PreSales Engineer with seven years of experience working at Stealthbits Technologies, now part of Netwrix. Alex specialises in Active Directory and Data Access Governance projects helping customers assess and cleanup Active Directory and unstructured/structured data repositories.

If the Breach Comes: Defend & Recover Your AD

A single improper change to an AD object can seriously damage both performance and security — so you need a solution that empowers you to quickly pinpoint and roll back those modifications. More broadly, you need to be able to spot suspicious behaviour in time to prevent costly breaches and downtime.

During the webinar, we’ll show you how you can:

  • Proactively identify and mitigate AD security gaps before attackers exploit them.
  • Promptly detect and contain even advanced threats.
  • Quickly recover from undesired changes and security incidents.

Webinar Presenters

Dirk Schrader avatar
Dirk Schrader
VP of Security Research

Being a native of Germany, he brings more than 25 years of delivering IT security expertise at a global scale. His work focuses on advancing cyber resilience as a sophisticated, new approach to tackle cyber-attacks faced by governments and organisations of all sizes for the handling of change and vulnerability as the two main issues to address in information security. He has published numerous articles in German and English about the need to address change and vulnerability to achieve cyber resilience, drawing on his experience and certifications as CISSP (ISC²) and CISM (ISACA).

Kent Tuominen avatar
Kent Tuominen
Solutions Engineer

Kent has over 25 years’ experience in the Technology field, training in formal classroom situations and achieving extensive deliverables of specific tasks in frequently high pressure environments. He has prepared course materials and taught classes related to network security, network administration, and network engineering. Specialises in Microsoft platforms.

Get Free Webinar Series
{{ firstError }}
We care about security of your data.
Privacy Policy