fbpx Say goodbye to (h)Active Directory – it’s hard to protect and easy to exploit | SASIG
Forgotten your password?

Members log in to register with one click

Non-members register here:

Registration form not showing or behaving correctly? Click here.

Thursday 15 April, 11am-12noon (BST)

Senior Systems Engineer Bradley Bosher demonstrates how attackers can easily exploit Active Directory (AD) using attacks such as Kerberoasting, DCShadow, and Azure AD Skeleton Keys.

We’ll show you how these attacks work, then give you actionable steps to find and fix dozens of the AD misconfigurations hackers love to exploit.

Join us to learn:

  • How attacks like Kerberoasting and DCShadow are carried out
  • What to monitor in your Active Directory
  • How to perform an AD health check using PowerShell scripts


Facilitated by

Martin Smith MBE (info), Chairman & Founder, The SASIG


Presented by

Bradley Bosher (info), Senior Systems Engineer, Varonis


Review the advice on using Zoom and other webex platforms securely here.

This website uses cookies, by continuing to use the site you agree to using cookies. Continue