Active Directory (AD) reconnaissance and exploitation has been a common technique utilized by attackers for some time. Adversaries enumerate or exploit AD because it is the primary hub for identities and resources within the enterprise and provides authorization and access for every user and device in the organization.
Join us for a special webcast on Thursday, January 18 at 11:00 a.m. CET and learn:
| Date | Location | Duration | Time of Event | Reminder |
|---|