Ignite 2018: There are no compensating controls for an insecure Active Directory

Today everything needs to be secure, but you need to start with Active Directory. Because if AD isn’t secure – nothing else in your organization is regardless of operating system, products, or procedures. That’s a strong statement, but one that Randy Franklin Smith can back up with facts. In this fast-paced session Randy spotlights the multitudinous ways that virtually any component or information on your network can be compromised if the attacker first gains unauthorized access to AD. The good news is AD was designed well and has stood the test of time. AD security is a matter of design, comprehensive management, and monitoring and is the basis for the list of fundamentals for securing AD shared in this session.

Related videos

Ignite 2018: How to protect and restore Active Directory from malicious or accidental destruction
Ignite 2018: How to protect and restore Active Directory from malicious or accidental destruction

In this case study session, Neil Flood, Manager of Identity and Access Management for Cargill, joins Brian Hymer from Quest to discuss best practices for Active Directory privileged account auditing and disaster recovery. Discover: - Top indicators of privileged account misuse - Symptoms of a failing (or failed) AD forest - How to determine optimal RTO and RPO - Hybrid AD and Azure AD recovery gotchas - How to justify an auditing and recovery tools purchase to your CISO See a live demo of an AD forest recovery, and get a step-by-step walk through of how to build a virtual test lab using production data.