Threat HUNTing Platform
Credential Risk Assessment and Remediation
ORKOS: Preventing the 9 steps to domain collapse
R9B understands the cognitive aspects of cyber operations. Our curriculum provides the hands-on technical skills students require to attain a variety of advanced cybersecurity qualifications. We instill the knowledge, skills, and abilities necessary for our students to defeat the adversary. Below are our available courses. Please check back often as our course offerings are updated regularly. Government organizations, please contact R9B directly via training@root9B.com for pricing and purchasing information.
Introducing Orkos by root9B: Assessing Credential Risks & Lateral Movement – Closing the Gap in Security Programs. occurs several times. Please register for the date and time that works best for you:
What tactic is used to compromise computers more often than any other in a network breach? Stolen credentials and lateral movement. Remote exploits are rarely seen today; instead most attackers rely on social engineering – they trick a user into helping them break into a system. Once there, the attacker then steals the user’s credentials and attempts to move laterally throughout the network, continuing to steal and leverage other credentials until they achieve their goals. There are a lot of products that look at initial exploitation vectors, but what is out there that is looking at the risk to credential theft and lateral movement? Virtually nothing. Why? Because this kind of analysis is difficult to do comprehensively and accurately. Fortunately, root9B is releasing a new product to directly address this gaping hole in network security auditing. Join Eric Stride and Matthew Weeks as they discuss the importance of credential risk assessment, and as they introduce and demonstrate the use of root9B’s unique solution to this problem, Orkos. Orkos provides a comprehensive credential risk assessment, including the unique ability to visually interact with lateral movement attack graphs. Orkos enables system administrators to understand the risks in their network and provides recommendations on how to mitigate those risks. Come learn more with Eric (@EricStride) and Matt (@scriptjunkie1).
After registering, you will receive a confirmation email containing information about joining the webinar.
BACK TO NEWSROOM