Date: Thursday, September 17, 2020
Time: 12:00 PM Eastern Daylight Time
Duration: 1 hour
Once attackers break into your IT environment, they often lurk in the network for months. Their goal is to blend into normal traffic to avoid detection while looking for valuable data to steal. It’s up to IT pros to understand the techniques malicious actors use to stay off the radar and detect suspicious activity before data loss occurs.
Join Harjit Dhaliwal from ITPro Today and Dakota Brewer from Netwrix to learn how to improve your threat detection capabilities and protect your critical assets. By the end of this session, you’ll know:
- The techniques attackers commonly use to traverse the network without raising alarms
- Which tools can help you identify attackers on the prowl
- How to spot early-stage attacks so you can respond promptly
- Proven methods to defend your IT environment
Brought to you by:
If you have already registered, click here to access .
Dakota Brewer, Solutions Engineer, Netwrix
Over the course of his IT career, Dakota has held many different positions, from support specialist to systems administrator. His deep understanding of Microsoft technologies, virtualization and networks allows him to successfully address customer’s issues and provide cost-effective customized solutions for data security and protection.
Harjit Dhaliwal, Contributing Editor, ITPro Today
Harjit Dhaliwal is a Microsoft MVP and a Senior Systems Administrator in the Higher Education industry who specializes in Microsoft technologies such as Microsoft Endpoint Manager, ConfigMgr, SCOM, Windows Server architecture, Windows 10, Endpoint security, and patch management. Harjit is a member of several technology advisory boards, an international speaker, and he is well respected in the social media scene as a valuable influencer and as a technology evangelist. He is an active mentor to many IT professionals in the industry and proudly advocates for diversity and inclusion in all aspects of life.