Look at common attack timelines and scenarios, along with attacker access. Explore the concept of extending the time between an attacker’s initial breach and when they take control of organization, giving data security professionals time to detect, respond, and root out the intruder. See how to protect against pass-the-hash attacks using Credential Guard, how to lock down your server using Device Guard, and how you can better detect and investigate threats using new audit events that are triggered by malicious activity.
Looking for an awesome, no-nonsense technical conference for IT Pros, Developers, and DevOps? IT/Dev Connections kicks off in San Francisco in 2017!