Presenter Photo

  • How PtH attacks work, and how to prevent them
  • How to prevent password credential leakage in Windows
  • How credential attacks work
  • The role of cryptography for passwords in Windows
  • The DPAPI (Data Protection API) idea behind the cached credentials

Tune in to gain deep insights into pervasive encryption and decryption techniques used across systems, networks, and applications; and how to strengthen your Windows password security!