How do you defend Active Directory, aka the “keys to the kingdom,” if you don’t know where the attacks are coming from?
Hackers constantly find new ways to break into AD. And once inside, they’re increasingly adept at covering their tracks to silently create backdoors and establish persistent privileged access.
The expert presenters will play out both perspectives: attacker and defender. This is a red vs. blue standoff, so don’t expect a bunch of slideware. During this workshop, they’ll demonstrate:
- Ways that hackers can exploit AD in every stage of the cyber kill chain
- Common AD hacking and discovery tools such as Mimikatz, PowerSploit, and BloodHound
- Proactive steps to identify vulnerabilities in your AD configuration
- Strategies to harden your AD so that hackers don’t have an easy path to Domain Admins