Protecting the heart of an organization starts exactly there - locking down the systems that are most critical. However, the endpoint remains the initial point of intrusion whereby attackers can compromise devices and establish a beachhead with relative ease.
In this session, we detail how to remove local admin rights and prevent credential theft from developer and IT admin workstations, which are a common target for attackers.