Defending Against Credential Compromise Featuring a Live Hacking Demo
With nearly all ransomware variants also attacking endpoint and Active Directory credentials as part of an infection, it’s critical that security teams have visibility into what the adversary is doing in order to properly respond. Regardless of whether initial attack vectors are phishing-based, the result of vulnerability exploit or are leveraging remote desktop access, there are several common threat actions attackers must perform in order to gain access to any part of your environment beyond the initial compromised entrypoint.
Join this webcast to learn more about credential compromise with Alissa Knight, “recovering” hacker-turned-cyber educator, Jeff Trower, Product Manager for Tanium, hosted by technology expert Nick Cavalancia. In this webcast, Alissa will first provide a live real-world demonstration of the TTPs used by attackers to compromise Windows endpoints, attain elevated privileges, move laterally and ultimately crack Active Directory to gain full control over a victim network. Next, Jeff will discuss how to defend, dissect, analyze and respond to Alissa’s attack with Tanium’s Incident Response module.
Nick, Alissa, and Jeff will engage you in a discussion around the risk of and needed response to credential compromise. Topics will include:
- An in-depth look at credential compromise and methods used in today’s cyberattacks
- Why credentials are at the center of every cyberattack
- Effective ways to prevent, detect and respond to these attack actions
Please fill out your information below