The same methods defenders use to secure systems are often the ones attackers twist to break in. This webinar reveals how real-world adversaries exploit infrastructure flaws, use persistence to stay hidden, and what the upcoming NTLM phase-out means for your security posture. You’ll walk away with practical ways to recognize, mitigate, and stay ahead of these evolving threats.
In this session, we’ll cover:
- Infrastructure hacking techniques that still work. Explore how attackers continue to exploit overlooked weaknesses in networks and configurations to gain an initial foothold.
- Persistence methods that evade detection. Learn how attackers maintain long-term access using stealthy techniques that can bypass even mature defenses.
- Preparing for the phase-out of NTLM. Understand the implications of NTLM’s deprecation, how it affects authentication and compatibility, and what steps you should take to transition securely.
- Real-world defense insights. Discover practical detection strategies, response steps, and configuration practices that strengthen your environment against these and other modern threats.
Why Attend?
💬Live Q&A: Chat directly with Paula, Peter, and Amr after the webinar to dive deeper into persistence and privilege escalation techniques.
🙌 Hands-on demonstrations: See real-world examples of the most effective techniques for detecting, investigating, and defending against modern threats.
🎁Challenge: Win awesome prizes during our live cybersecurity challenge!