Active Directory is a core IT identity system, but it can be highly vulnerable to compromise in complex IT environments. All too often, the kill chain to a breach, or a ransomware infestation, runs through AD. Unless we can quickly detect cyberattackers or rogue domain administrators moving laterally into the AD environment and escalating their privileges, disaster could strike.

Effective Active Directory audit and the ability to roll back undesired configuration changes are both critical to IT infrastructure protection. In this on-demand webinar, Dan Blum, Principal Consultant from Security Architects Partners will cover:

  • Why AD in the large enterprise is a target-rich environment for attackers
  • Common AD attack vectors
  • Good practices and policies for AD protection
  • How to back up strict policies with effective audit
B in a circle

Dan Blum

Managing Partner and Principal Consultant, Security Architects

An internationally-recognized expert in security, privacy, cloud computing, and identity management, Dan Blum leads and delivers consulting projects such as: cloud security and privacy assessments, security program assessments, risk management framework reviews, and identity management architectures.

Formerly a Golden Quill award-winning VP and Distinguished Analyst at Gartner, Mr. Blum holds CISSP and Open FAIR certifications. He has participated in industry groups such as ISACA, FAIR Institute, the CSA, IDPRO, Kantara Initiative, and others.