Julie Brown Erika Noerenberg Sarah Yoder Cathy Cramer

Privilege Escalation: How Attackers Level Up

Learn to detect adversaries who use privilege escalation to access sensitive systems and information.


Can’t attend? Register anyway and we’ll send you the recording.

Why you’ll want to join the live webcast:

  • Get a better understanding of privilege escalation and how it’s being used across operating systems 
  • Find out if you have the right tools in place to provide detection coverage
  • Learn useful analytics for observing privilege escalation in your environment
  • Discover additional ways to test and implement actionable detection strategies