Detalhes do evento
At first glance, password spraying would hardly seem worth the effort for an attacker against an organization with decent security. In a perfect world password spraying wouldn’t be so effective. But in the world we actually live in, it’s quite the opposite. Password spraying is effective for a number or reasons:
But password spraying takes an exponential leap higher in effectiveness when you can’t even get the audit events, which is a potential problem with Azure Active Directory, as reported by Ars Technica and SecureWorks. Moreover, a bad password in on-prem AD exposes lots of other stuff in the cloud thanks to the coupled security risks of today’s hybrid environment.
This webcast explores:
In this technical and practical session, Matthew Vinton, Strategic Systems Consultant for Quest, talks about what makes password spraying difficult to detect, how it gets more useful with the bigger the target, and what can be done with regular credentials (at minimum, recon). Matthew also demonstrates how Quest On Demand Audit provides a single audit plane across AD and AAD, and can perform anomaly detection, at scale, across those two platforms.
To prevent AD password sync from making the cloud vulnerable, we discuss how to:
Palestrantes
Detalhes do evento
Ao fazer o download, você se inscreverá para receber nosso e-mail marketing. Para cancelar sua inscrição, siga as etapas descritas em nossa Política de Privacidade.
reCAPTCHA protege este site. Confira a Política de Privacidade e os Termos de Uso do Google.