Privileged credential theft is one of the most common points of entry for an attacker. As attacks become more frequent and sophisticated, it’s imperative for organizations to understand the latest hacking techniques and shore up their lines of defense.

Join renowned hacker, Paula Januszkiewicz, in this upcoming webinar where she will demonstrate:

  • Techniques used by hackers to steal passwords from the memory of Windows systems
  • 15+ places where passwords can be stored in the operating system and how to extract them
  • Weak access points that Windows admins should pay attention to

BeyondTrust CTO, Morey Haber, will follow-up with a demonstration of how to further mitigate password attacks by using solutions like PowerBroker for Windows to remove privileges from users, while also allowing elevated privileges for applications as needed.

After the webinar, Paula, will share some of her own tools to help you better protect your Windows systems.

B in a circle

Paula Januszkiewicz

Security MVP, CEO at CQURE

Paula Januszkiewicz, CEO CQURE, penetration tester and mentor of CQURE Academy. Paula is also an Enterprise Security MVP and trainer (MCT) and Microsoft Security Trusted Advisor. She is also a top speaker at many well-known conferences including TechEd North America, TechEd Europe, TechEd Middle East, RSA, TechDays, CyberCrime, etc., and is often rated as number-one speaker. Paula is engaged as a keynote speaker for security related events and she writes articles on Windows Security. Her company CQURE has now 3 locations New York, Dubai and Warsaw. Paula has conducted hundreds of IT security audits and penetration tests, including those for governmental organizations, she is a renowned security consultant. Her distinct specialization is related to Microsoft security solutions in which she holds multiple Microsoft certifications, besides being familiar with and possessing certifications in other related technologies and operating systems. Paula is passionate about sharing her knowledge with others. In private, she enjoys researching new technologies, which she converts to authored trainings. She wrote a book about Threat Management Gateway 2010, and is working on her next book. She has access to a source code of Windows! Every year she makes over 200 flights (2013 - 248) to gain more and more experience, provides penetration tests and consults Customers about how to secure their infrastructures. Her favorite saying is: "I have a tool for that!"