Watch this two-part webinar series to explore common gaps in AD security that adversaries exploit using techniques like DCSync, Kerberoasting and certificate abuse. Learn how to safeguard your network — addressing critical AD vulnerabilities and implementing effective security controls against sophisticated attacks with expert guidance from Vincent Le Toux, AD Security Evangelist & Product Owner for Netwrix PingCastle.
In our first session, we will explore the key strategies for mitigating risks and vulnerabilities. Vincent Le Toux, AD Security Evangelist & Product Owner for Netwrix PingCastle, will show how you can audit your environment to identify common risks in your AD security posture that enable attacks, like the ones mentioned in the Detecting and Mitigating Active Directory Compromises guide. This report was authored by the top six security agencies, ASD, CISA, NSA, CCCS, NCSC-NZ, and NCSC-UK, and PingCastle is highlighted as one of the essential tools for securing AD environments against evolving threats.
Watch this session to gain insights into:
Understand common AD attack vectors that could jeopardise your organisation, such as DCSync, Kerberoasting, Certificate Template Abuse (ESC1) and Domain Controller Coercion.
Identify security gaps that could leave your organisation exposed to different threats.
Implement remediation strategies to address identified risks across your AD configurations, policies, and more.
Vincent Le Toux, the founder of PingCastle, is a well-renowned Active Directory expert and experienced threat response practitioner. He contributed to many open-source tools, such as Mimikatz, OpenPGP, OpenSC, and the GIDS applet. Vincent is also a seasoned speaker and has presented at numerous security conferences, including BlackHat, FIRST, and BlueHat.
Ian has been in IT for over 24 years, specializing in Data and Access Governance / Identity security for 19 of those years. He began his security career performing electronic and physical attack and penetration testing studying under ex - CIA and Military ranks. Prior to his 13 years with Netwrix, Ian ran the Security Architecture team for a Fortune 100 US Financial Institution defending the highly public bank from a wide range of inherited and emerging threats.
In our second session, we focused on critical Active Directory attack tactics, detection strategies, and prevention methods to safeguard your organisation. During this webinar we had an in-depth demonstration of live attacks stimulation and practical detection and prevention methods featuring a complete product demonstration across our entire suite of AD security solutions.
Watch this session to gain insights into:
DCSync Attacks: Dive into DCSync techniques, explore permissions audits, and uncover attack paths and detection strategies. Learn how to secure replication permissions, detect DCSync attacks, and prevent unauthorised access through Domain ACL monitoring and defense-in-depth strategies.
Kerberoasting Attacks: Understand the risk Kerberoasting poses to enterprise environments. We’ll cover the detection, mitigation and prevention techniques, including specific lockdown measures on SPN changes in your Admin Account OUs while keeping service account OUs accessible.
Kevin has a passion for cyber security, specifically understanding the tactics and techniques attackers use to exploit organisations environments. With eight years of experience in product management, focusing on Active Directory and Windows security, he’s taken that passion to help build solutions for organisations to help protect their identities, infrastructure and data.
As a Security Researcher at Netwrix, Joe is an expert in Active Directory, Windows, and a wide variety of enterprise software platforms and technologies. Joe researches new security risks, attack techniques, and associated mitigations and detections.
Jeff is a solutions engineer at Netwrix who specializes in security, governance and compliance and has a proven track record of delivering high-value, data-centric projects. He has deployed and integrated security solutions in a variety of industries, including financial, legal and manufacturing.