Banks, credit unions, insurance companies,
Hacker Explains: Gaining Unauthorized Access to Your Windows IT Environment
About this webinar
Over the past year, there has been a steady increase in cyber attacks on both enterprises and public sector entities. Analyzing these attacks in detail will help to identify attack vectors that were used and demonstrate the need to better protect our IT environments.
Join IT experts Liam Cleary and Jeff Melnick as they explain the top methods that attackers use to gain unauthorized access to your environment, using:
- privilege escalation
Get practical information about how to defend against the most common attacks using native Microsoft Windows tools and Netwrix Auditor. Register for this webinar today!
Password123456: Protecting your Active Directory Castle
Hackers love it when we choose weak or leaked passwords for our most important accounts. What if we could better protect our companies by preventing users from picking over 500 million known bad passwords? And better yet, what if we could do this for free?
In this session, you will learn how to:
- Download and customize the popular Pwned Passwords list
- Incorporate Pwned Passwords into Active Directory for free using the open source PwnedPasswordsDLL project
- Build customized lists of additional bad passwords
- Enforce a strong password policy and monitor for unauthorised changes to it using Netwrix Auditor