Netwrix Enterprise Auditor (formerly StealthAUDIT) 11.6 has been released LEARN MORE


CQURE’s Overview of STEALTHbits Cyber Kill Chain Attack Catalog

Duration: 60 Minutes

Attacks against critical infrastructure like Active Directory and Windows operating systems are well documented, but often poorly communicated to or understood by the cybersecurity community as a whole. To help bridge the gap, STEALTHbits created a Cyber Kill Chain Attack Catalog. Designed to be a useful, informational asset, IT Security practitioners can now easily understand the specific and sophisticated tactics, techniques and procedures (TTPs) attackers are leveraging to compromise credentials and data.
STEALTHbits has partnered with CQURE, Inc., a specialized IT infrastructure security consultant providing advisory services to organizations around the world, to shine a light on this valuable cybersecurity resource. 

In an informative, 60-minute webinar, Rod Simmons, STEALTHbits’ VP of Product Strategy, and Paula Januskiewicz, CEO and Founder of CQURE, will review our attack tutorials and offer their feedback on interesting attacks and breach scenarios. Together, they will provide a detailed overview and example demonstrations of important phases of the Cyber Kill Chain, including:

  • Discovery
  • Lateral Movement
  • Privilege Escalation
  • Persistence
VP of Product Strategy – Active Directory Stealthbits Technologies
CEO and Founder of CQURE

    View the webinar


    © 2022 Stealthbits Technologies, Inc.