1-949-407-5125

Detecting and Mitigating

Active Directory Attacks

ON-DEMAND

Active Directory (AD) quite literally holds the keys to the kingdom. If AD compromised, the security of everything connected to it is compromised as well.

 

Watch the webinar with Adam Rosen and Alex McCoy for an in-depth look at the sophisticated tactics, techniques and procedures (TTPs) that attackers employ to compromise credentials and data. 

W E B I N A R

They explain and demonstrate all key phases of the cyber kill chain, including:

Discovery

Lateral movement

Privilege escalation

Persistence

Plus, you will learn how to detect and mitigate powerful TTPs, including LDAP reconnaissance, Pass-the-Hash, password extraction from NTDS.dit and more!

Adam Rosen is an expert on managing and securing data, Adam has helped organizations of all sizes implement controls and policies to meet security, compliance, and efficiency objectives. In his current capacity, he manages Netwrix’ portfolio of data security and data privacy technologies depended on by enterprises around the world to protect their most critical information.

Adam Rosen

Vice President of Product Strategy at Netwrix

Alex McCoy

PreSales Engineer

at Netwrix

Alex McCoy is a PreSales Engineer with seven years of experience working at Stealthbits Technologies now part of Netwrix. Alex specializes in Active Directory and Data Access Governance projects helping customers assess and cleanup Active Directory and unstructured\structured data repositories.

Presenters

© 2022 Netwrix Corporation

Privacy Policy | EU Privacy Policy | EULA

300 Spectrum Center Drive, Suite 200 Irvine, CA 92618 | Phone: 1-949-407-5125 | Toll-free: 888-638-9749

© 2022 Netwrix Corporation

Privacy Policy | EU Privacy Policy | EULA

300 Spectrum Center Drive, Suite 200 Irvine, CA 92618 Phone: 1-949-407-5125 | Toll-free: 888-638-9749

Detecting and Mitigating Active Directory Attacks

ON-DEMAND

Active Directory (AD) quite literally holds the keys to the kingdom. If AD compromised, the security of everything connected to it is compromised as well.

 

Watch the webinar with Adam Rosen and Alex McCoy for an in-depth look at the sophisticated tactics, techniques and procedures (TTPs) that attackers employ to compromise credentials and data. 

W E B I N A R

Lateral movement

They explain and demonstrate all key phases of the cyber kill chain, including:

Discovery

Privilege escalation

Persistence

Plus, you will learn how to detect and mitigate powerful TTPs, including LDAP reconnaissance, Pass-the-Hash, password extraction from NTDS.dit and more!

Adam Rosen

Vice President of

Product Strategy at Netwrix

Alex McCoy

PreSales Engineer

at Netwrix

Presenters

© 2022 Netwrix Corporation

Privacy Policy | EU Privacy Policy | EULA

300 Spectrum Center Drive, Suite 200 Irvine, CA 92618 | Phone: 1-949-407-5125 | Toll-free: 888-638-9749

© 2022 Netwrix Corporation

Privacy Policy | EU Privacy Policy | EULA

300 Spectrum Center Drive, Suite 200 Irvine, CA 92618 Phone: 1-949-407-5125 | Toll-free: 888-638-9749