On-Demand Webinars

Security Masterclass

How to Bulletproof Your Identity Security Strategy

Get Free Webinar Series
{{ firstError }}
We care about security of your data.
Privacy Policy

This two-part webinar series explores the critical challenges organisations face in protecting their identity infrastructure. As cyberattacks increasingly target identities, it’s essential to implement robust defence, detection, and response strategies. The series provide valuable insights into securing on-premises identity systems like Active Directory and integrating Identity Threat Detection and Response (ITDR) into broader security operations. Gain actionable guidance on reducing vulnerabilities, preventing credential theft, and strengthening their security posture to stay ahead in an evolving threat landscape.

Register for the webinar
Fortifying On-Premises Identity Systems: Active Directory Threat Prevention, Detection & Response
{{ firstError }}
We care about security of your data.
Privacy Policy
Register for the webinar
Adapting to a New Paradigm in Security: Implementing Identity Threat Detection and Response (ITDR) in Your SOC
{{ firstError }}
We care about security of your data.
Privacy Policy

Fortifying On-Premises Identity Systems: Active Directory Threat Prevention, Detection & Response

Explore essential strategies for protecting your Active Directory (AD) environment against identity-based threats in this on-demand webinar. As cybercriminals increasingly target identities and systems, organisations need to adapt their detection, response, and mitigation tactics in real time. Active Directory is the backbone of access control and authentication in many organisations, making its security crucial. This session offers actionable insights and tools to fortify your AD security posture, helping you defend against evolving identity threats and ensuring your organisation is prepared to protect its most critical identity infrastructure.

Watch this session to:

  • Understand the key risks and vulnerabilities specific to AD attacks.
  • Discover best practices for reducing your identity attack surface and remediating misconfigurations.
  • Learn how to implement real-time detection and response strategies to safeguard your on-premises identity infrastructure.
  • Explore the latest technologies and techniques to prevent credential theft and privilege abuse within your AD environment.

Webinar Presenters

Adam Laub avatar
Adam Laub
General Manager

Adam brings over 15 years of experience in the software industry, having performed roles across Sales, Marketing, Product Management, and Business Operations. Prior to joining Netwrix, Adam held multiple senior management positions at Stealthbits Technologies, helping to grow the company as one of the first employees from an early-stage startup to a recognised leader in data security solutions for large enterprises around the world. He holds a Bachelor’s degree in Business Administration from Susquehanna University’s Sigmund Weis School of Business and is located in New Jersey.

Kevin Joyce avatar
Kevin Joyce
Senior Technical Product Manager

Kevin is passionate about cyber-security and holds a Bachelor of Science degree in Digital Forensics from Bloomsburg University of Pennsylvania.

Adapting to a New Paradigm in Security: Implementing Identity Threat Detection and Response (ITDR) in Your SOC

With the rise of cloud adoption, identity has become a critical attack vector, making it essential for organisations to rethink how they handle security. While traditional security operations focus on endpoints (EDR) and networks (NDR), identity threats are often overlooked. This webinar will guide you through the key considerations for implementing an Identity Threat Detection and Response (ITDR) programme within your organisation’s Security Operations Centre (SOC).

Watch this session to learn:

  • The growing importance of identity security in today’s cyber threat landscape.
  • Key factors to consider when building an ITDR programme.
  • How to integrate ITDR seamlessly into your SOC for comprehensive protection.
  • Best practices for defending against identity-based cyber threats.

Webinar Presenters

Tyler Reese avatar
Tyler Reese
Director of Product Management, CISSP

With more than two decades in the software security industry, Tyler Reese is extremely familiar with the rapidly evolving identity and security challenges that businesses face.

Currently, he is the product director for the Identity and Access Management portfolio at Netwrix. His professional experience ranges from IAM consulting for the Fortune 500 to being an enterprise architect for a large direct-to-consumer company.

Jennifer Taufan avatar
Jennifer Taufan
Solutions Engineer

Jennifer is a Solutions Engineer at Netwrix, where she partners with organisations to address their data security needs. Prior to joining Netwrix, she worked in healthcare IT alongside major healthcare organisations to optimise their reporting solutions. At Netwrix, she continues to ensure organisations can secure their data and meet regulatory requirements.

Get Free Webinar Series
{{ firstError }}
We care about security of your data.
Privacy Policy