Bob your employee is back and he’s ready to use Active Directory (AD) to attack your environment. Worse yet, this time he brought some of his colleagues. With Disgruntled Dan and Careless Craig, he has even more leverage to take control.
Active Directory is very widely used, but unfortunately it is not particularly well set up to tackle insider threats.
In this webinar, we are excited to have Jim Cook the country manager of Attivo Networks who will be discussing how organisation can mitigate the progress of a malicious insider in their tracks.
ATTIVO NETWORKS
Website: https://attivonetworks.com/
Free Active Directory Assessment: https://attivonetworks.com/active-dir…
LinkedIn: https://www.linkedin.com/in/jimcook
Email: jim.cook@attivonetworks.com
Website: https://attivonetworks.com/
Free Active Directory Assessment: https://attivonetworks.com/active-dir…
LinkedIn: https://www.linkedin.com/in/jimcook
Email: jim.cook@attivonetworks.com
NAKED INSIDER BOOKS
1. Protecting Your Business From Insider Threats In 7 Effective Steps https://www.nakedinsider.com/Download…
2. How To Develop An Insider Risk Mitigation Program In 7 Steps (by Boaz Fischer) https://www.nakedinsider.com/InsiderR…
1. Protecting Your Business From Insider Threats In 7 Effective Steps https://www.nakedinsider.com/Download…
2. How To Develop An Insider Risk Mitigation Program In 7 Steps (by Boaz Fischer) https://www.nakedinsider.com/InsiderR…
FOLLOW ME ON MY ADVENTURES
SABASAI
LinkedIn: https://www.linkedin.com/in/seanofir