Unveiling Vulnerabilities in Active Directory - How the cloud exposes a 24 year old technology to attacks?
- Active Directory
- Tenable Identity Exposure
Rediscover and prioritize weaknesses within your Active Directory Domains. Learn how you can reduce identity risk, while boosting preventative security measures and implementation efficiency.
In an era where cloud adoption is at its peak, the risks associated with Active Directory security have never been more pronounced. In this session we explore how cloud exposes this foundational technology to a myriad of cyber threats. From identity and access management challenges to the evolving threat landscape, we’ll explore the complex interplay between Active Directory and cloud environments.
Gain valuable insights into potential attack vectors, and discover practical strategies to fortify your organization’s defense and steps you can take to proactively discover and remediate identity risk across your on-prem and cloud environments.
Highlights
- Top Active Directory Attacks, Techniques and Vulnerabilities
- Identify and fix weaknesses across your Active Directory
- Best practices and quick wins
- Demo and how Tenable can help
Who should watch?
Security professionals responsible for administering and protecting Active Directory environments from exploitation and cyber attacks.
This session is presented by a panel of APJ Identity Exposure security experts.
Relatori
Field CTO APJ, Tenable
Principal Security Engineer, Tenable
Tenable One
Richiedi una demo
La piattaforma di gestione dell'esposizione basata sull'IA leader nel mondo.
Grazie
Grazie per l'interesse dimostrato per Tenable One.
Un rappresentante ti contatterà a breve.
Form ID: 7469
Form Name: one-eval
Form Class: c-form form-panel__global-form c-form--mkto js-mkto-no-css js-form-hanging-label c-form--hide-comments
Form Wrapper ID: one-eval-form-wrapper
Confirmation Class: one-eval-confirmform-modal
Simulate Success