Securing Active Directory often involves the ongoing management of lists and spreadsheets. However, cybercriminals approach an attack from a completely different mindset—focusing on an attack path, not a list. Organizations can flip the proverbial script on attackers by thinking like an attacker—beating them at their own game. In this workshop, we will decrypt attack paths […]
Active Directory (AD) is a major component within all IT infrastructure. It is ever-connected to the majority of mission-critical applications, services, and devices. More so, AD is the central component of Identity Access Management (IAM) and underlying security protocols. The challenge: by its nature, AD is always changing—and it’s this constant change that continues to […]