You’re just one step away from connecting with fellow CXOs
Americas
Addressing internal identity-based attack surface with ITDR
Eighty percent of modern cyberattacks are identity-driven, and industry researchers claim Active Directory is involved in 90% of attacks studied. Impersonation techniques play a huge role in cyberattacks once intruders gain a foothold in the environment. A single initial identity verification check is not sufficient. In this discussion, we explore how identity threat detection and remediation (ITDR) tools work to scan the environment in real time and alert analysts to potential issues, preventing identity abuse and privilege escalation. Join us to learn more about this critical capability.
Common adversary techniques
How do adversaries exploit Group Policy Preferences (GPP) to elevate their access?
How do adversaries impersonate other accounts to gain access to enterprise resources?
How do adversaries chain together multiple tactics to move laterally in the network?
What are some of the popular hacking tools used by adversaries?
ITDR capabilities
How can ITDR help discover issues like GPP password exposure and other risky configurations?
How can ITDR prevent identity abuse and privilege escalation after the initial identity verification?
What kind of guidance does ITDR provide for performing remediation?