Attack Path Management: Network and Authentication
Learn how attackers chain vulnerabilities, permissions, and identities into paths — and how you can cut them off before they lead to compromise.
Why Attend This Webinar?
- Understand the real-world mechanics of how attackers exploit both networks and identities.
- See how contextual risk — not just CVEs — determines your most dangerous exposures.
- Explore techniques to visualize and disrupt attacker movement before it reaches critical assets.
- Learn how identity-based attack paths are exploited — and how to shut them down fast.
- Preview NopSec’s latest capabilities for managing attack paths across infrastructure and Active Directory.
What You’ll Learn
- The three key components of vulnerability risk: threat-based, asset value, and contextual.
- How network segmentation and strong authentication can eliminate entire categories of attack paths.
- The difference between infrastructure- and identity-driven attack paths — and why the latter is harder to detect.
- How lateral movement works using legitimate credentials and Kerberos tokens.
- How to identify and score high-risk attack paths that intersect with permissive network rules and exploitable vulnerabilities.
- A live look at NopSec’s identity-based Attack Path Management (APM) capabilities.
Meet the Expert Speakers:
Michelangelo Sidagni CTO & Co-founder NopSec |
|
Rob Johnson Director of Sales Engineering NopSec |
|
Alex Bazay CISO Align |
Date and Time:
- June 6, 2025
- 1:00 PM Eastern Time
- Duration: 60 minutes (including live Q&A)
Join Us Live or On-Demand
Join live to ask your questions directly to our experts.
Can’t attend? Register to get Priority Replay Access right after the session.
Register now to reserve your spot!