Julie Brown Erika Noerenberg Sarah Yoder Cathy Cramer

Privilege Escalation: How Attackers Level Up

Watch this webinar to learn to how adversaries level up to access sensitive systems and information. Experts from Red Canary, Carbon Black, and MITRE weigh in on how privilege escalation looks on various operating systems and what you should collect to detect it.

Why you’ll want to watch the webcast:

  • Get a better understanding of privilege escalation and how it’s being used across operating systems 
  • Find out if you have the right tools in place to provide detection coverage
  • Learn useful analytics for observing privilege escalation in your environment
  • Discover additional ways to test and implement actionable detection strategies