AD Attack Paths: How Object-level Permissions Lead to Inadvertent Access

Presented by

Jeff Warren, GM-Products, Stealthbits now part of Netwrix

About this talk

The overwhelming majority of organizations worldwide leverage Active Directory (AD) as their central hub of authentication and authorization. It literally holds the keys to the kingdom, and because of this, it is a central target for threat actors to leverage in order to infiltrate your organization. Unfortunately, native tools and views into AD and AD object permissions lack the ability to scale effectively, even in smaller environments. Without this insight, your organization is vulnerable to a variety of AD attack paths and inadvertent access that can lead to serious data breaches. Join Jeff Warren, GM, Stealthbits Technologies, as he reviews: • How attackers can exploit weak AD permissioning • Weak Password Identification and Reset Capabilities • Unconstrained Delegation Permissions

Related topics:

More from this channel

Upcoming talks (2)
On-demand talks (145)
Subscribers (3540)
Netwrix empowers information security and governance professionals to reclaim control over sensitive, regulated and business-critical data, regardless of where it resides. Over 10,000 organizations worldwide rely on Netwrix solutions to secure sensitive data, realize the full business value of enterprise content, pass compliance audits with less effort and expense, and increase the productivity of IT teams and knowledge workers.