Join us as Professionals from Rensselaer Polytechnic Institute (RPI) dive into how to address abnormal activity amidst a growing number of alerts.
Key Notes:
Discussion of best practices for securing Active Directory (AD), a primary target for attackers seeking privilege escalation.
Strategies for implementing a defense-in-depth approach to AD, ensuring multiple security layers must be bypassed before domain admin rights can be achieved.
Guidance on strengthening AD defenses and enhancing alerting systems to detect subtle signs of compromise, reducing risks of lateral movement and privilege escalation.
Focus on leveraging machine learning (ML) to detect anomalies in network traffic, user behavior, and system activity for more accurate identification of abnormal or potentially malicious patterns.
Overview of using canaries and canary tokens as proactive tools to identify early-stage reconnaissance or network scanning attempts.
Actionable insights into advanced alerting techniques, ML-driven anomaly detection, and strategic deployment of canaries to catch attackers early.
Practical advice on securing AD and implementing best practices for robust, multi-layered defenses.
Together, these insights equip participants with a comprehensive toolkit for strengthening security posture, enhancing detection capabilities, and proactively identifying threats before they escalate.

