Recorded: November 16 | 2023 Watch
In today's rapidly evolving IT landscape, identity systems, especially Microsoft Active Directory (AD) used by over 90% of enterprises, are under consistent threat. As such, safeguarding identity systems is no longer an option; it's a necessity.
Join us for this illuminating session led by Dirk Schrader, VP of Security Research at Netwrix, where he’ll delve into the depths of Identity Threat Detection and Response (ITDR) — a term introduced by Gartner to describe tools and best practices to protect identity systems.
Dirk will uncover the insidious ploys utilized by cybercriminals to exploit identity infrastructure misconfigurations and vulnerabilities. Gain a comprehensive understanding of critical ITDR capabilities you need to prevent, detect, respond to, and recover from identity-based threats.
Also, Dirk will demonstrate how Netwrix cutting-edge solutions empower organizations to efficiently defend against identity-based threats.
Join this enlightening session to:
- Understand why identity-based attacks are one of the top security threats today.
- Gain insights into the stealthy tactics that cybercriminals use to compromise identity systems.
- Learn the multi-layered strategy to prevent, detect, and respond to identity-related threats.
By the end of this immersive session, you will be equipped with actionable insights and advanced strategies to secure your key identity store — Active Directory, effectively navigating the intricate challenges posed by contemporary identity threats in the ever-evolving cybersecurity landscape.
Presenter
Dirk Schrader is a seasoned expert in cyber resilience and information security processes, Dirk is Global VP of Security Research at New Net Technologies, now part of Netwrix, the leading provider of SecureOps™. A 25-year veteran in IT security with certifications as CISSP (ISC²) and CISM (ISACA), he works to advance cyber resilience as a modern approach to tackling cyber threats. Dirk has worked on cybersecurity projects around the globe, starting in technical and support roles at the beginning of his career and then moving into sales, marketing and product management positions at both large multinational corporations and small startups. He has published numerous articles about the need to address change and vulnerability management to achieve cyber resilience.