Privilege Escalation: How Hackers Get Elevated Permissions

About this webinar

Recorded: June 14, 2018

Often, to inflict damage on critical systems or steal the data they want, attackers need administrative-level access. Gaining those permissions is not a simple task, since most operating systems now have built-in protections against privilege escalation. But many attackers do succeed. 

During this webcast, you will discover: 

  • Top methods that attackers use to escalate their privileges 
  • How to defend against these techniques 
  • How you can quickly identify and investigate privilege escalation
Hosted by
Liam Cleary,
Office Apps and Services MVP
Kennet Johansen ,
Solutions Engineer

Deep Dive: How to Reduce the Exposure of Your Critical Data

To reduce the overexposure of regulated and mission-critical data, it’s not enough to understand where it resides; you also need to uncover any issues that put the data at risk and quickly remediate them. With solutions from Netwrix, you can reduce the exposure of your sensitive data by moving it to a safe location, deleting confidential pieces of content from it and more.

Join us and discover how Netwrix solutions enable you to:

  • Understand which data needs protection and how exposed it is
  • Automatically migrate overexposed data to quarantine before a breach occurs
  • Automatically redact sensitive content from documents
  • Identify and revoke excessive permissions
  • Increase the accuracy of your data loss prevention (DLP) tool
29
August
12:00pm EDT
29 August, 12:00pm EDT
Register Now