Active Defense & Deception , Endpoint Detection & Response (EDR) , Network Detection & Response

OnDemand Webinar I Protecting Active Directory Without Privileged Access

Learn how to use Active Directory Assessments for critical issues

Organizations value Active Directory for its ability to provide uninterrupted service and to manage employee authentication, identity, and access control for its members. However, given the privileged credentials and access stored inside, Active Directory has become an enticing target for attackers seeking to obtain administrator access. Attackers are winning, with three-quarters of all attacks attributed to privileged access credential abuse.

Join this webinar to hear Steve Hunt, a senior cybersecurity analyst at Aite Group, outline why attackers have been successful, decisions that have created weaknesses, and why common security efforts have been insufficient in preventing attacks using advanced techniques. Additionally, Carolyn, chief security advocate and CMO of Attivo Networks, will share alternative and practical approaches that organizations can take to modernize privileged access credentials and access protection.

In this session, you will learn how to use Active Directory Assessments for:

  • Evaluating AD cybersecurity hygiene and understanding potential risks
  • Identifying specific domain, computer, and user-level risks
  • Detecting live attacks as attackers discover, move, and attempt to compromise AD
  • Gaining continuous assessment and visibility to rogue domain controllers, DCSync and DCShadow, and Golden Ticket attacks

*This session is for: Security professionals that want to improve AD security without the need for privileged access.


About the Author

Information Security Media Group

Information Security Media Group (ISMG) is the world's largest media company devoted to information security and risk management. Each of its 37 media sites provides relevant education, research and news that is specifically tailored to key vertical sectors including banking, healthcare and the public sector; geographies from North America to Southeast Asia; and topics such as data breach prevention, cyber risk assessment and fraud. Its yearly global summit series connects senior security professionals with industry thought leaders to find actionable solutions for pressing cybersecurity challenges.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.