Mitigating lateral escalation compromises (pass the hash)
We'll review the problem, then focus discussion on practical actions we can take to mitigate it. Some obvious possibilities for review (which may require their own session): Our Microsoft Advanced Threat Analytics deployment, Microsoft's Privileged Access Workstations, approaches to reduce privileges, and local admin password management.
2
votes
