You’re just one step away from connecting with fellow CXOs

Americas map Americas map
Map Pin

Americas

28
March 2024
-
CXO

Location:

8112 East Coast Hwy, Newport Beach, CA 92657

View Map

Virtual Event

Register Now

Addressing internal identity-based attack surface with ITDR

Eighty percent of modern cyberattacks are identity-driven, and industry researchers claim Active Directory is involved in 90% of attacks studied. Impersonation techniques play a huge role in cyberattacks once intruders gain a foothold in the environment. A single initial identity verification check is not sufficient. In this discussion, we explore how identity threat detection and remediation (ITDR) tools work to scan the environment in real time and alert analysts to potential issues, preventing identity abuse and privilege escalation. Join us to learn more about this critical capability.

Common adversary techniques

  • How do adversaries exploit Group Policy Preferences (GPP) to elevate their access?

  • How do adversaries impersonate other accounts to gain access to enterprise resources?

  • How do adversaries chain together multiple tactics to move laterally in the network?

  • What are some of the popular hacking tools used by adversaries?

ITDR capabilities

  • How can ITDR help discover issues like GPP password exposure and other risky configurations?

  • How can ITDR prevent identity abuse and privilege escalation after the initial identity verification?

  • What kind of guidance does ITDR provide for performing remediation?

CXO Regional Roundtable
CXO Regional Roundtable