On Demand
August 15th
Reduce Identity Exposure Risk by Securing and Monitoring Active Directory
Zero Trust assumes a breach has occurred. A secure Active Directory (AD) environment is an essential step in minimizing the damage from a cyber attack and enabling a Zero Trust environment. In this presentation, we will discuss how hackers leverage AD to achieve successful cyber attacks that lead to encryption (aka ransomware) and/or exfiltration of sensitive data, and how proactive AD security steps can block attack paths and prevent damage from those attacks.
Underwritten by:

Cyber Security Strategies and the importance of edge computing environment
With cyberattacks increasing in quantity and sophistication it is becoming ever-more-important for all government entities to develop a pro-active and resilient data security risk management strategy. Developing a focused approach specific to edge computing environments is increasingly important because frequently these areas can pose the most significant levels of security risk as they are not fully encompassed by the organization’s perimeter. (1) In this session we will discuss why this is such an important area of cyber security focus and share key insights to help inform government entity decision making processes.