Ransomware in 50 Minutes: Top Current Threats & What Experts Expect in 2021
Date: Friday, June 18th at 9 a.m. PDT / 12 noon EDT
A Virtual Event Covering Critical Issues Around Microsoft's Directory Technologies.
Some Active Directory (AD) Security events can map to specific MITRE ATT&CK® events recorded in the security logs on Windows AD endpoints, Domain Servers, and Controllers. MITRE ATT&CK® is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations.
Join Ian Thornton-Trump CD for a walk through of a recent US Government Agency compromise and how monitoring of the Windows Security Event log could have revealed the unauthorized activity - on many occasions.
With the use of an inexpensive RMM tool or Log collection & event parsing cloud service detecting adversary behaviors can be very easy & obvious. Security Event log monitoring can also be leveraged to reveal the possibility of insider threat behaviors in the Windows AD environment.
This session is Part One of our free half-day Azure AD & Active Directory Security Summit
. Sign up for this session and you are welcome to attend all three sessions! Sessions include:
Session 1: 9:00 a.m. – 9:55 a.m. PDT
Ransomware in 50 Minutes: Top Current Threats & What Experts Expect in 2021
Session 2: 10:00 a.m. – 10:55 a.m. PDT
Evolving Your Disaster Recovery Infrastructure for 2021
Session 3: 11:00 a.m. – 12 p.m. PDT
Hottest Third-Party Disaster Recovery Solutions
Register now!
About the presenter:
Ian Thornton-Trump, CISO, Cyjax
Ian Thornton-Trump CD is an ITIL certified IT professional with 25 years of experience in IT security and information technology. From 1989 to 1992, Ian served with the Canadian Forces (CF), Military Intelligence Branch; in 2002, he joined the CF Military Police Reserves and retired as a Public Affairs Officer in 2013. After a year with the RCMP as a Criminal Intelligence Analyst, Ian worked as a cyber security analyst/consultant for multi-national insurance, banking and regional health care.