For the best web experience, please use IE11+, Chrome, Firefox, or Safari

Hank the Hacker webcast series: How to Overcome Common Hybrid AD and Cloud Security Challenges

Organizations like yours are sprinting to Microsoft cloud services, such as Office 365 and Azure Active Directory (AD). But as your cloud — and hybrid — footprint expands, so does your security risk. That’s because in a hybrid AD environment, you face all the security limitations of native AD plus those of Azure AD. That means you need to manage double the surface area to overcome potential data breaches and insider threats caused by hackers like the star of the video above — Hank.

Hank’s big prize? Your Active Directory environment. It’s his crown jewel, and, if he cracks it, he controls your network, its data, the devices on it — the whole shebang. So, are you ready to do what’s necessary to stop Hank the Hacker and a million others like him?

Select your events


On Demand

May

3

There are more hybrid Active Directory (AD) security risks in your environment than you think. Proper AD security isn’t just about whether it’s configured correctly; it’s about proactively assessing who has access to what: permissions, privileged groups, sensitive business groups, GPOs and data. 

In this on-demand webcast, Quest AD experts will show you how to conduct a thorough assessment of your environment so you know who has access to what. Assessing your security configuration makes it so you can easily identify access to: 

  • Active Directory
  • Exchange Online 
  • File Servers

Want the slide deck? View it here. 

On Demand

May

10

Just because your hybrid Active Directory (AD) environment is secure today doesn’t mean it will be tomorrow. You need to stay on top of unusual or suspicious activity if you want to ensure everything happening in your environment is always on the up and up.

In this on-demand webcast, Quest AD experts will identify our two-fold strategy that defines inappropriate changes and then creates strategic alerts for when they occur. We’ll then explore how this strategy helps to reduce the risk of exposure caused by insider attacks and data breaches.

Want the slide deck? View it here.

On Demand

May

17

Most organizations have multiple administrators with privileged accounts. But when you consider Hank the Hacker only has to breach one of those accounts to obtain privileged access to your environment, you start to get an idea of how important it is to keep an eye on those accounts. 

In this on-demand webcast, Quest AD experts will show you how to both automatically remediate unauthorized actions immediately to minimize potential damage, but also automate security policy enforcement across Active Directory (on-premises and Azure AD) to mitigate the potential for recurrence.

Want the slide deck? View it here.

On Demand

May

24

There are many changes within your hybrid Active Directory (on-premises and Azure AD) environment that can be indicative of a breach, making the current state of AD no longer trustworthy. In these instances, you’d need to investigate security events and the most likely path to the potential breach, and then be able to recover AD in the same way you think about recovering from any other disaster to ensure business continuity. 

In this on-demand webcast, Quest AD experts will show you how to reduce incident response time investigations across your environment. Discover how to automate your AD business continuity plan (BCP) to minimize your RTO (recovery time objective) in the event of a security incident that causes partial or total damage across your AD infrastructure.