What would a real hacker do to your Active Directory

Sign in to queue

Description

Cloud security stays and falls with the Active Directory. The session focuses on several relatively unknown yet extremely sensitive security settings of Active Directory which, in case of misconfiguration or misunderstanding, pose a severe threat to the whole forest environment and may, if exploited, enable the real internal hacker to take control of virtually anything in your infrastructure

Embed

Download

Download this episode

The Discussion

Add Your 2 Cents