Identity, and Active Directory in particular, is a cyber attacker’s prime target, with 80% of breaches today involving compromised identities. From an attackers’ point of view, it makes se
Group Policy is a systems management technology that can have great implications for the security of an Active Directory environment. In this session we will delve into the ways that GPOs can be both used and misused by those that gain a level of control.
Focus on securing identities, devices and applications, which are usually the first pillars to tackle in a Zero Trust journey. You will walk away with five projects that you can implement in your organization.