A Hacker Explains: How Attackers Exploit Office 365 Vulnerabilities

About this webinar

Recorded: August 17, 2018

Office 365 has become the platform of choice for document collaboration and sharing. If you’re using Office 365 or planning to migrate there, understanding the types of security attacks you can expect is imperative. Microsoft provides tools for testing your end users by simulating some of the most common attacks, so you can educate them as part of your broader defense strategy.

In this webinar, you’ll discover:

  • Some of the most common Office 365 security attacks
  • How to use the Attack Simulator to test your end users
  • How to spot attacks in early stages so you can take steps to prevent a breach

Hosted by
Jeff Melnick,
Systems Engineer
Liam Cleary,
Microsoft MVP

Behind the Scenes: 4 Ways Your Organization Can Be Hacked

If you had a hacker sneaking around your network right now, how would you know? In this webinar, Brian Johnson from 7 Minute Security will reveal some of the top security gaps that attackers can use to breach an organization’s IT perimeter. Then Jeff Melnick from Netwrix will show how Netwrix Auditor can catch attackers red-handed before they can take control of your systems.

The session will uncover:

  • How to access a network using a foothold on a compromised machine
  • How to gain remote physical access using a hacking tool such as LAN Turtle
  • How to brute-force a local workstation’s admin account
  • How to detect suspicious activity in its early stages to prevent a breach

Come see what some real-world attacks look like — and how to stop them in their tracks!

22
January
12pm EST
22 January, 12pm EST
Register Now