Ultimate Cyber Battle: Hacker vs Netwrix

Presented by

Brian Johnson, Security Enthusiast & President of 7 Minute Security and Grant Stromsodt, Solutions engineer at Netwrix

About this talk

Prepare to be captivated as Brian Johnson, a skilled white-hat hacker, embarks on a daring mission to infiltrate privileged accounts, with intentions ranging from illicit data acquisition to espionage and disruption of critical systems. The burning question lingers: Will he succeed in his audacious endeavors?   Secure your front-row seat at the exhilarating Hacker vs Netwrix live cyber battle, where you will witness firsthand the meticulous step-by-step unraveling of various common attacks. Immerse yourself in the revelation of how the implementation of the principle of least privilege across endpoints can emerge triumphant in salvaging the situation.   In this spectacle, Netwrix will demonstrate its prowess in defending against a multitude of attacks, including but not limited to:   - Exploiting widespread local admin access, often granted excessively, to extract clear-text credentials from memory. - Performing lateral movement from one compromised system to gain local admin privileges across the network. - Abusing open RDP access to remotely infiltrate a system with admin privileges, extracting copies of the AD database or exfiltrating sensitive content. - Leveraging local admin rights. - Utilizing downloadable malware. - Exploiting USB devices.   Don't miss this extraordinary opportunity to witness the relentless clash between hackers and defenders, unfolding right before your eyes.

Related topics:

More from this channel

Upcoming talks (1)
On-demand talks (47)
Subscribers (6477)
Netwrix empowers information security and governance professionals to identify and protect sensitive data to reduce the risk of a breach. Our solutions also limit the impact of attacks by helping IT teams detect, respond and recover from them faster and with less effort. Over 13,500 organizations worldwide rely on Netwrix solutions to strengthen their security and compliance posture across all three primary attack vectors: data, identity and infrastructure.