Tuesday, September 30th, 2025 at 12:00 pm ET
When credentials are stolen, legacy systems fail: UnitedHealth paid a $22M ransom after attackers accessed a Citrix portal with no MFA, and Microsoft was breached through a forgotten legacy account.
Most teams don’t realize that stolen credentials can be rendered useless, even in on-prem environments.
Join us to see how CrowdStrike ITDR and Beyond Identity enforce phishing-resistant, device-bound authentication on protocols like NTLM, Kerberos, and LDAP, without ripping out current infrastructure.
You'll learn how to:
CrowdStrike stops breaches. Beyond Identity prevents them at initial access.
Tuesday, September 30th, 2025 at 12:00 pm ET
When credentials are stolen, legacy systems fail: UnitedHealth paid a $22M ransom after attackers accessed a Citrix portal with no MFA, and Microsoft was breached through a forgotten legacy account.
Most teams don’t realize that stolen credentials can be rendered useless, even in on-prem environments.
Join us to see how CrowdStrike ITDR and Beyond Identity enforce phishing-resistant, device-bound authentication on protocols like NTLM, Kerberos, and LDAP, without ripping out current infrastructure.
You'll learn how to:
CrowdStrike stops breaches. Beyond Identity prevents them at initial access.