Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
Home > Preempt > Preempt On Demand Webinar
 

Preempt On Demand Webinar

Webinar Published By: Preempt
Preempt
Published:  Nov 02, 2018
Type:  Webinar

Attackers and malware are increasingly relying on a common set of tools to compromise identities and spread within a network. Tools like Mimikatz accompanied with common administrator tools like PsExec and WMI have become a standard part of an attacker’s arsenal to turn a single machine compromise into a full network breach. In this webinar we will take a look at why some of these tools are traditionally difficult to control, and introduce new countermeasures that let you fight back. In this webinar we will cover:

- An analysis of recent malware and attacks and the tools they used to spread through the network.

- A closer look at the underlying protocols supporting these tools, and the traditional challenges to controlling them.

- Introduce new controls that allow organizations to control NTLM in real-time, block pass-the-hash techniques, and adaptively control the use of NTLM in the network.

- How to gain visibility into PsExec, WMI, and RPC in general and how to create controls that distinguish valid from malicious use of these powerful tools.



Tags :