How to Fish Out an Attacker in Active Directory

Greg Tworek

About this Webinar

How many times a week do you wonder about who, in a group of admins, actually makes changes in Active Directory (AD)? If you have ever been concerned with how to trace these situations – this session is for you. Join security experts from the CQURE team, who will demo (and hack!) several situations to show:

  • Why changes to AD could impact the security of the environment
  • How to monitor AND INSPECT certain situations in AD
  • How to leverage Active Directory built-in tools to spot an attacker in your environment
  • Challenges associated with usage of standard tools, and how to overcome them
  • How to build a system that can alert and ease the manual review process

Tune in and learn how to fish out an attacker, and keep your environment safe!

Greg Tworek

Director, Cqure
Greg has been working with Windows Security since the very beginning of his professional career. He started as a system administrator, then moved to a consultant role, IT manager and chief information security officer (CISO). Now he is mainly responsible for consulting services delivered worldwide by CQURE. He has access to a source code of Windows.