Attackers and malware are increasingly relying on a common set of tools to compromise identities and spread within a network. Tools like Mimikatz accompanied with common administrator tools like PsExec and WMI have become a standard part of an attacker’s arsenal to turn a single machine compromise into a full network breach. In this on-demand webinar we will take a look at why some of these tools are traditionally difficult to control, and introduce new countermeasures that let you fight back.

Watch now to learn:

  • Analysis of recent malware attacks like SamSam, Petya/NotPetya, etc.
  • Closer look at underlying protocols and challenges to control them
  • New controls for NTLM and how to block pass-the-hash
  • How to gain visibility into PsExec, WMI and RCI and distinguish malicious use