Recorded Webinars

A Hacker Explains

How Your IT Environment Can Be Compromised

Watch this practical webinar series about cybersecurity solutions, prepared by Liam Cleary, MVP,
Associate Director and Solution Architect for Protiviti
. These webinars walk you through the hacking
process, the techniques hackers use once inside your network, and the tools and techniques you can use
to defend your IT environment. At the end of the three-webinar series, you will have a better understanding
of your organization’s cybersecurity posture and be able to improve your protection strategy.

Initial Compromise: How Attackers Break in

Today, hacking tools are so easy to find and use that attackers no longer need specialized skills and knowledge; they simply deploy the tool of their choice. As a result, attacks are more frequent than ever, and it’s critical for internal information technology and security teams to spot them quickly. The key to protecting your environment is knowing what types of attacks to look for.

In this webinar, you will learn:
  • What common attack methods can be used to compromise a network, server or device
  • How to identify the threats to your information security space
  • How to mitigate the risk of the attacks
  • What tools can help you to identify attacks

Hiding in Plain Sight:
How Attackers Move through the Network Undetected

Once attackers have breached the perimeter, they often lurk in the network for months, looking for valuable data to steal. To stay hidden, they try to make their actions blend in with normal traffic.

By the end of this session, you will know:
  • What techniques attackers use to traverse the network without raising alarms
  • What native Microsoft tools can help you spot covert attacks
  • How you can identify the hiding attacks by using Netwrix Auditor functionality

Privilege Escalation:
How Hackers Get Elevated Permissions

Often, to inflict damage on critical systems or steal the data they want, attackers need administrative-level access. Gaining those permissions is not a simple task, since most operating systems now have built-in protections against privilege escalation. But many attackers do succeed.

During this webcast, you will discover:
  • Top methods that attackers use to escalate their privileges
  • How to defend against these techniques
  • How you can quickly identify and investigate privilege escalation

Webinar Presenters

Liam Cleary avatar
Liam Cleary
Associate Director and Solution Architect at Protiviti

Liam started as a trainer but realized that programming, breaking and hacking was a lot more fun. After spending time within infrastructure and security services, he moved into consultancy focusing on collaboration technologies. He is also a Microsoft MVP, and can be found presenting at many conferences, as well as teaching his kids how to code, raspberry PI programming, hacking the planet or building Lego robots.

Twitter: @helloitsliam

Jeff Melnick
Systems Engineer at Netwrix Corporation
Jeff Melnick has over 15 years of experience in the IT field performing Active Directory migrations, integrations and installations for various businesses. Jeff now helps organizations strengthen IT security, streamline compliance and optimize operations.