STEALTHbits Technologies, Inc © 2018
Identify Threats. Secure Data. Reduce Risk.

Detecting Pass-the-Hash with Honeypots 

Pass-the-hash and pass-the-ticket attacks can be some of the most effective techniques for attackers to use to move laterally throughout your organization, and also the most difficult to detect.  Most detections rely on differentiating between what is normal behavior for a user and what is abnormal.  While this can be effective, it is also time consuming and results in lots of false positives.  In this webinar, we will explore how to use modern honeypot techniques to lay traps for attackers and emphatically detect the use of the pass-the-hash technique within your organization.

If you are unable to join the live webinar, register to receive a video recording after the event.
STEALTHbits Technologies

Register Now

Date: Thursday, August 9th
Time: 1:00 PM EDT
Duration: 60 minutes


STEALTHbits Technologies

Live Webinar

Jeff Warren
SVP of Technical Product Management & Development
STEALTHbits Technologies, Inc.