Thinking Like an Attacker: Understanding Attack Paths & Immediate Privilege Escalation
Securing Active Directory often involves the ongoing management of lists and spreadsheets. However, cybercriminals approach an attack from a completely different mindset—focusing on an attack path, not a list. Organizations can flip the proverbial script on attackers by thinking like an attacker—beating them at their own game. In this workshop, we will decrypt attack paths […]