Ultimate Cyber Battle: Hacker vs Netwrix

Presented by

Brian Johnson, Security Enthusiast & President of 7 Minute Security and Grant Stromsodt, Solutions engineer at Netwrix

About this talk

Prepare to be captivated as Brian Johnson, a skilled white-hat hacker, embarks on a daring mission to infiltrate privileged accounts, with intentions ranging from illicit data acquisition to espionage and disruption of critical systems. The burning question lingers: Will he succeed in his audacious endeavors?   Secure your front-row seat at the exhilarating Hacker vs Netwrix live cyber battle, where you will witness firsthand the meticulous step-by-step unraveling of various common attacks. Immerse yourself in the revelation of how the implementation of the principle of least privilege across endpoints can emerge triumphant in salvaging the situation.   In this spectacle, Netwrix will demonstrate its prowess in defending against a multitude of attacks, including but not limited to:   - Exploiting widespread local admin access, often granted excessively, to extract clear-text credentials from memory. - Performing lateral movement from one compromised system to gain local admin privileges across the network. - Abusing open RDP access to remotely infiltrate a system with admin privileges, extracting copies of the AD database or exfiltrating sensitive content. - Leveraging local admin rights. - Utilizing downloadable malware. - Exploiting USB devices.   Don't miss this extraordinary opportunity to witness the relentless clash between hackers and defenders, unfolding right before your eyes.
Related topics:

More from this channel

Upcoming talks (2)
On-demand talks (90)
Subscribers (8130)
Netwrix empowers security professionals to face digital threats with confidence by enabling them to identify and protect sensitive data as well as to detect, respond to, and recover from attacks. More than 13,500 organizations across 100+ countries rely on Netwrix solutions to strengthen their security and compliance posture across all three primary attack vectors: data, identity, and infrastructure. By reducing the cybersecurity burden with Netwrix, organizations concentrate on advancing their cause while reducing cyber risk. For more information, visit www.netwrix.com