Detecting and Mitigating
Active Directory Attacks
ON-DEMAND
Active Directory (AD) quite literally holds the keys to the kingdom. If AD compromised, the security of everything connected to it is compromised as well.
Watch the webinar with Adam Rosen and Alex McCoy for an in-depth look at the sophisticated tactics, techniques and procedures (TTPs) that attackers employ to compromise credentials and data.
W E B I N A R
They explain and demonstrate all key phases of the cyber kill chain, including:
Discovery
Lateral movement
Privilege escalation
Persistence
Plus, you will learn how to detect and mitigate powerful TTPs, including LDAP reconnaissance, Pass-the-Hash, password extraction from NTDS.dit and more!
Adam Rosen is an expert on managing and securing data, Adam has helped organizations of all sizes implement controls and policies to meet security, compliance, and efficiency objectives. In his current capacity, he manages Netwrix’ portfolio of data security and data privacy technologies depended on by enterprises around the world to protect their most critical information.
Adam Rosen
Vice President of Product Strategy at Netwrix
Alex McCoy
PreSales Engineer
at Netwrix
Alex McCoy is a PreSales Engineer with seven years of experience working at Stealthbits Technologies now part of Netwrix. Alex specializes in Active Directory and Data Access Governance projects helping customers assess and cleanup Active Directory and unstructured\structured data repositories.
Presenters
© 2024 Netwrix Corporation
6160 Warren Parkway, Suite 100 Frisco, TX 75034 | Phone: 1-949-407-5125 | Toll-free: 888-638-9749
Detecting and Mitigating Active Directory Attacks
ON-DEMAND
Active Directory (AD) quite literally holds the keys to the kingdom. If AD compromised, the security of everything connected to it is compromised as well.
Watch the webinar with Adam Rosen and Alex McCoy for an in-depth look at the sophisticated tactics, techniques and procedures (TTPs) that attackers employ to compromise credentials and data.
W E B I N A R
Lateral movement
They explain and demonstrate all key phases of the cyber kill chain, including:
Discovery
Privilege escalation
Persistence
Plus, you will learn how to detect and mitigate powerful TTPs, including LDAP reconnaissance, Pass-the-Hash, password extraction from NTDS.dit and more!
Adam Rosen
Vice President of
Product Strategy at Netwrix
Alex McCoy
PreSales Engineer
at Netwrix
Presenters