Active Directory Best Practices to Frustrate Attackers

Active Directory out of the box defaults aren’t enough to keep your network safe.  Here’s the word on the street about frustrating attackers in your Active Directory environment. It’s easy to make things hard.  But it’s not hard to make things easy. Spin that how you will, running Active Directory efficiently isn’t necessarily easy, but it certainly can be easy to make things hard for attackers in your environment.  Here are some baseline things you can do to make your Active Directory environment frustrating for attackers.  Attackers’ main resource is time, and if you can slow them down and frustrate them, you have a better chance of making attackers look for easier targets, or at least more time for your response team to identify and protect your assets.
Watch Now

Spotlight

OTHER ON-DEMAND WEBINARS

Global Threat Report: The Year of the Next-Gen Cyberattack

Carbon Black

2016 may have been “The Year of the Fileless Attack” and 2017 may have been “The Year of Ransomware,” but 2018 was, in many respects, “The Year of the Next-Gen Cyberattack." These attacks are increasingly being fueled by geopolitical tension and reveal how clever attackers have become in evolving to remain undetected — using techniques such as lateral movement, island hopping and counter incident response to stay invisible. Join our discussion on the latest in threat intelligence including: The most prevalent ransomware and commodity malware families during the past year. Why we're seeing increases in nation-state cyberattacks.
Watch Now

Private Equity Cybersecurity: Preliminary Look at Exclusive Compliance Checklist

ACG

Join ACG’s Private Equity Regulatory Taskforce (PERT) and Dennis Johnson, Wipfli LLP Risk Advisory Services Manager, as they divulge pertinent information about the best-in-class Wipfli Cybersecurity Checklist. The Cybersecurity Checklist is an exclusive perk for PERT members. However, all webinar attendees will benefit from an illuminating glimpse into the cybersecurity resource. The Cybersecurity Checklist helps firms to measure cybersecurity functions at their particular institution. It does this by using the PERT’s exclusive Cybersecurity “Principle” and the SEC’s cybersecurity guidance.
Watch Now

Zero Trust Security For Your Distributed Workforces

2020 has caught many businesses off guard. Users, data, devices, critical business applications and networks have left the office and become more distributed. This shift in the way we work & do business has resulted in companies losing visibility into what was happening in their corporate and their employees’ personal networks, devices, and applications. This shift has also seen several cybercriminals and sophisticated hacking groups rapidly adjusting their technique
Watch Now

Five Phases of Ethical Hacking

GreyCampus

GreyCampus & EC-Council together bring in an informative 1-hour webinar for ethical hacking aspirants. Our subject matter expert will take you through the 5 phases of Ethical Hacking out of the 18 mentioned above. The webinar will follow as per the outline below: Introduction to Ethical Hacking & Career Opportunities. Phases of Ethical Hacking. Phase 1 – Reconnaissance.
Watch Now