Privilege Escalation: How Hackers Get Elevated Permissions

About the Webinar

Often, to inflict damage on critical systems or steal the data they want, attackers need administrative-level access. Gaining those permissions is not a simple task, since most operating systems now have built-in protections against privilege escalation. But many attackers do succeed. 

During this webcast, you will discover: 

  • Top methods that attackers use to escalate their privileges 
  • How to defend against these techniques 
  • How you can quickly identify and investigate privilege escalation
Liam Cleary, Office Apps and Services MVP
Kennet Johansen , Manager Solutions Engineering EMEA & APAC