SlideShare a Scribd company logo
The Rise of Active
Directory Exploits:
Is it Time to Sound
the Alarm?
Paula Musich
Research Director
Enterprise Management Associates (EMA)
Watch the On-Demand Webinar
• The Rise of Active Directory Exploits On-Demand Webinar:
https://info.enterprisemanagement.com/the-rise-of-active-directory-
exploits-webinar-ws
• Check out upcoming webinars from EMA here:
https://www.enterprisemanagement.com/freeResearch
Featured Speaker
Paula brings over 30 years of experience covering
the IT security and networking technology
markets. She has been an IT security analyst for
over ten years, including as a research director at
NSS Labs, and earlier as the principal analyst for
enterprise security for Current Analysis. As a
security technology analyst, Paula has tracked
and analyzed competitive developments in the
threat management segment of the information
security market, ranging from advanced anti-
malware to next-generation firewalls and intrusion
prevention systems to content security, data loss
prevention, and more.
© 2021 Enterprise Management Associates, Inc. 3
Paula Musich
Research Director
Security, Risk & Compliance Management
Enterprise Management Associates
| @ema_research
Sponsors
© 2021 Enterprise Management Associates, Inc. 4
| @ema_research
Agenda
Introduction:
Attackers are
Turning up the
Heat on
Active
Directory
1 2 3
Methodology
and
Demographics
Active
Directory
Security
Threats &
Challenges
4
Active
Directory
Security Tools
& Tactics
5
Active
Directory Risk
& Attack
Remediation
6
Active
Directory
Security
Priorities &
Spending
© 2021 Enterprise Management Associates, Inc. 5
| @ema_research
Introduction,
Demographics &
Methodology
SAML
Annual Revenue
11% $1M - <$20M
14% $2M - <$100M
43% $100M - <$1B
28% $1B+
Vertical Industries
26% High Technology Software
16% Finance/Banking/Insurance
13% Manufacturing
12% Retail/Wholesale
Number of Respondents
250
Geography
North America
Demographics & Methodology
Company Size
37% Large Enterprise
63% SME
© 2021 Enterprise Management Associates, Inc. | @ema_research
Groups Responsible for Securing Active Directory
8
83% IT Operations
73% Security Operations
48% Network Operations
32% Infrastructure Team
29% Identity Team
The Complexity of Securing
Active Directory Requires
Collaboration Across
Groups with Different Levels
of Expertise
© 2021 Enterprise Management Associates, Inc. | @ema_research
© 2021 Enterprise Management Associates, Inc. 9
Over 90% of organizations
have 10 or more domain
controllers, which represents
an exceptionally large
attack surface.
| @ema_research
Active Directory
Security Threats &
Challenges
11
© 2021 Enterprise Management Associates, Inc. | @ema_research
Other up and
coming attack types:
Silver ticket attack;
FoggyWeb backdoor
© 2021 Enterprise Management Associates, Inc. 12
| @ema_research
What Makes Securing Active Directory so Hard?
© 2021 Enterprise Management Associates, Inc. 13
Top Reasons Other Issues
lack of visibility to identify exposures
no understanding of consequences
of changes being made
| @ema_research
25% Hard to detect live attacks on AD
21% Too hard to coordinate security across multiple groups
15% Can’t keep up with constant changes in AD
Active Directory
Security Tools &
Tactics
Downsides to audit
Snapshot in time
Downsides to log analysis
Time consuming & costly
© 2021 Enterprise Management Associates, Inc. 15
| @ema_research
Who does the assessments?
IT operations 79%
Security operations 73%
MSP/MSSP 37%
Internal Red Team/pen testers 29%
Outside auditors/contractors 26%
© 2021 Enterprise Management Associates, Inc. 16
| @ema_research
© 2021 Enterprise Management Associates, Inc. 17
| @ema_research
© 2021 Enterprise Management Associates, Inc. 18
| @ema_research
Only 33% look for live
attacks targeting
Active Directory
Active Directory
Risk & Attack
Remediation
How to Determine the Best Remediation Options for
Active Directory Exposures
© 2021 Enterprise Management Associates, Inc. 20
67% Rely on Active Directory experts
46% Turn to third-party consultants
43% Apply specific tools to help identify the best remediation options
34% Search for remediation options on the internet
| @ema_research
20
21
© 2021 Enterprise Management Associates, Inc. | @ema_research
Accepting Active Directory Exposures
© 2021 Enterprise Management Associates, Inc. 22
| @ema_research
Active Directory
Security Priorities
& Spending
24
© 2021 Enterprise Management Associates, Inc. | @ema_research
Future Spending Plans for Active Directory Security
© 2021 Enterprise Management Associates, Inc. 25
Top 3 reasons to increase it
25% increase in AD attacks
18% increase in work-from-home activity
17% cloud usage expansion
| @ema_research
35% Plan to significantly increase it
51% Plan to slightly increase it
14% Don’t plan to change it
Get the report!
https://bit.ly/3GKgeqz
© 2021 Enterprise Management Associates, Inc. 26
| @ema_research

More Related Content

PPTX
What is Cryptography and Types of attacks in it
PPTX
Types of attacks
PPT
Security Attacks.ppt
PPT
Software security engineering
PPT
Classical Encryption Techniques in Network Security
PPTX
cryptography ppt free download
PPT
Deadlock Detection in Distributed Systems
PDF
Introduction to Windows Dictionary Attacks
What is Cryptography and Types of attacks in it
Types of attacks
Security Attacks.ppt
Software security engineering
Classical Encryption Techniques in Network Security
cryptography ppt free download
Deadlock Detection in Distributed Systems
Introduction to Windows Dictionary Attacks

What's hot (20)

PPTX
Brute force-attack presentation
PPT
Lecture1 Introduction
PPT
Secure Socket Layer
PPT
Public Key Cryptography and RSA algorithm
PPTX
Extendible hashing
PPTX
Introduction to information security
PPTX
Substitution techniques
PPTX
Cryptographic algorithms
PPTX
Symmetric and asymmetric key
PPTX
Social engineering presentation
PPTX
Cybersecurity 1. intro to cybersecurity
PPT
authentication.ppt
PPT
Intruders and Viruses in Network Security NS9
PDF
Information Security Lecture Notes
PPTX
Denial of service
PPTX
Code Generation
PPT
Intrusion Detection Systems and Intrusion Prevention Systems
PDF
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
PDF
Introduction to Cryptography
PPTX
Password Cracking
Brute force-attack presentation
Lecture1 Introduction
Secure Socket Layer
Public Key Cryptography and RSA algorithm
Extendible hashing
Introduction to information security
Substitution techniques
Cryptographic algorithms
Symmetric and asymmetric key
Social engineering presentation
Cybersecurity 1. intro to cybersecurity
authentication.ppt
Intruders and Viruses in Network Security NS9
Information Security Lecture Notes
Denial of service
Code Generation
Intrusion Detection Systems and Intrusion Prevention Systems
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
Introduction to Cryptography
Password Cracking
Ad

Similar to The Rise of Active Directory Exploits (20)

PDF
Secure Coding Practices – Growing Success or Zero-Day Epidemic?
PDF
Responding to the Pandemic: Information Security and Technology Trends
PDF
TLS 1.3’s Fourth Anniversary: What Have We Learned About Implementation and N...
PPTX
Does Anyone Remember Enterprise Security Architecture?
PDF
The State of Modern Application Development: From Speed to Awareness
PDF
How Network Teams are Powering Stronger Cybersecurity: Closing Gaps in Vulner...
PDF
EMA Megatrends in Cyber-Security
PDF
From Adversaries to Allies: Bridge the NetOps-SecOps Gap with Network Observa...
PDF
Network Observability: Managing Performance Across Hybrid Networks
PDF
NetSecOps: Examining How Network and Security Teams Collaborate for a Better ...
PDF
Cyber Threat Intelligence: Transforming Data into Relevant Intelligence
PDF
Real-world incident response, management, and prevention
PDF
How Automation and Orchestration Can Help Bridge the IT Security Skills Gap
PDF
Observability: Challenges, Priorities, Solutions, and the Role of OpenTelemetry
PPTX
Fortify-Application_Security_Foundation_Training.pptx
PPTX
Fortify-Application_Security_Foundation_Training.pptx
PDF
Zero Trust Networking: How Network Teams Support Cybersecurity
PDF
Debunking the Myths Around API Security Research Slides
PDF
DevSecOps: Why Automation and Security are Critical to Successful Cross-Funct...
PDF
Challenges and Best Practices for Securing Modern Operational Technology Netw...
Secure Coding Practices – Growing Success or Zero-Day Epidemic?
Responding to the Pandemic: Information Security and Technology Trends
TLS 1.3’s Fourth Anniversary: What Have We Learned About Implementation and N...
Does Anyone Remember Enterprise Security Architecture?
The State of Modern Application Development: From Speed to Awareness
How Network Teams are Powering Stronger Cybersecurity: Closing Gaps in Vulner...
EMA Megatrends in Cyber-Security
From Adversaries to Allies: Bridge the NetOps-SecOps Gap with Network Observa...
Network Observability: Managing Performance Across Hybrid Networks
NetSecOps: Examining How Network and Security Teams Collaborate for a Better ...
Cyber Threat Intelligence: Transforming Data into Relevant Intelligence
Real-world incident response, management, and prevention
How Automation and Orchestration Can Help Bridge the IT Security Skills Gap
Observability: Challenges, Priorities, Solutions, and the Role of OpenTelemetry
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
Zero Trust Networking: How Network Teams Support Cybersecurity
Debunking the Myths Around API Security Research Slides
DevSecOps: Why Automation and Security are Critical to Successful Cross-Funct...
Challenges and Best Practices for Securing Modern Operational Technology Netw...
Ad

More from Enterprise Management Associates (20)

PDF
Enterprise Strategies for Hybrid, Multi-Cloud Networks
PDF
Unlocking the Future of Observability: OpenTelemetry’s Role in IT Performance...
PDF
The AI Advantage: How IT Leaders are Redefining Operations in 2025
PDF
The Future of Workload Automation and Orchestration: Driving Digital Transfor...
PDF
Navigating the Future of Security Operations Centers (SOC) with Agentic AI
PDF
Securing Tomorrow: The Role of AI in Transforming Cybersecurity
PDF
Applying Generative AI to IT Operations Research
PPTX
Network as a Service: Understanding the Cloud Consumption Model in Networking
PDF
Orchestrating Data Transfers in the Digital Era: Navigating Challenges and So...
PDF
Network Management Megatrends 2024: Skills Gaps, Hybrid and Multi-Cloud, SASE...
PDF
ServiceOps 2024: automation and (gen)AI-powered IT service and operations
PDF
The Evolution of Work: Enhancing Productivity and Collaboration through Digit...
PDF
Avoid Observability Failure: Hybrid Enterprises Must Complement APM with Inte...
PDF
EMA AIOps Radar: A Guide to Investing in Innovation
PDF
Enterprise Network Automation: Emerging from the Dark Ages and Reaching Towar...
PDF
Redefining Automation Horizons: Orchestrating Multi-Cloud Landscapes
PDF
Expert Insights: Rethinking Your Network Operations Toolset as Cisco Prime En...
PDF
Highlights from the EMA Radar™ Report for Workload Automation and Orchestrati...
PDF
Modern ITSM—the untapped game-changer for midsize organizations
PDF
Unveiling Strategic Trends in Global Finance, Banking, and Insurance - IT Ex...
Enterprise Strategies for Hybrid, Multi-Cloud Networks
Unlocking the Future of Observability: OpenTelemetry’s Role in IT Performance...
The AI Advantage: How IT Leaders are Redefining Operations in 2025
The Future of Workload Automation and Orchestration: Driving Digital Transfor...
Navigating the Future of Security Operations Centers (SOC) with Agentic AI
Securing Tomorrow: The Role of AI in Transforming Cybersecurity
Applying Generative AI to IT Operations Research
Network as a Service: Understanding the Cloud Consumption Model in Networking
Orchestrating Data Transfers in the Digital Era: Navigating Challenges and So...
Network Management Megatrends 2024: Skills Gaps, Hybrid and Multi-Cloud, SASE...
ServiceOps 2024: automation and (gen)AI-powered IT service and operations
The Evolution of Work: Enhancing Productivity and Collaboration through Digit...
Avoid Observability Failure: Hybrid Enterprises Must Complement APM with Inte...
EMA AIOps Radar: A Guide to Investing in Innovation
Enterprise Network Automation: Emerging from the Dark Ages and Reaching Towar...
Redefining Automation Horizons: Orchestrating Multi-Cloud Landscapes
Expert Insights: Rethinking Your Network Operations Toolset as Cisco Prime En...
Highlights from the EMA Radar™ Report for Workload Automation and Orchestrati...
Modern ITSM—the untapped game-changer for midsize organizations
Unveiling Strategic Trends in Global Finance, Banking, and Insurance - IT Ex...

Recently uploaded (20)

PDF
KodekX | Application Modernization Development
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PPT
Teaching material agriculture food technology
PPTX
MYSQL Presentation for SQL database connectivity
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Machine learning based COVID-19 study performance prediction
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PPTX
A Presentation on Artificial Intelligence
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Approach and Philosophy of On baking technology
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
Big Data Technologies - Introduction.pptx
KodekX | Application Modernization Development
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Chapter 3 Spatial Domain Image Processing.pdf
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Teaching material agriculture food technology
MYSQL Presentation for SQL database connectivity
NewMind AI Weekly Chronicles - August'25 Week I
Building Integrated photovoltaic BIPV_UPV.pdf
Agricultural_Statistics_at_a_Glance_2022_0.pdf
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Unlocking AI with Model Context Protocol (MCP)
Dropbox Q2 2025 Financial Results & Investor Presentation
Machine learning based COVID-19 study performance prediction
Understanding_Digital_Forensics_Presentation.pptx
A Presentation on Artificial Intelligence
Encapsulation_ Review paper, used for researhc scholars
Approach and Philosophy of On baking technology
“AI and Expert System Decision Support & Business Intelligence Systems”
Big Data Technologies - Introduction.pptx

The Rise of Active Directory Exploits

  • 1. The Rise of Active Directory Exploits: Is it Time to Sound the Alarm? Paula Musich Research Director Enterprise Management Associates (EMA)
  • 2. Watch the On-Demand Webinar • The Rise of Active Directory Exploits On-Demand Webinar: https://info.enterprisemanagement.com/the-rise-of-active-directory- exploits-webinar-ws • Check out upcoming webinars from EMA here: https://www.enterprisemanagement.com/freeResearch
  • 3. Featured Speaker Paula brings over 30 years of experience covering the IT security and networking technology markets. She has been an IT security analyst for over ten years, including as a research director at NSS Labs, and earlier as the principal analyst for enterprise security for Current Analysis. As a security technology analyst, Paula has tracked and analyzed competitive developments in the threat management segment of the information security market, ranging from advanced anti- malware to next-generation firewalls and intrusion prevention systems to content security, data loss prevention, and more. © 2021 Enterprise Management Associates, Inc. 3 Paula Musich Research Director Security, Risk & Compliance Management Enterprise Management Associates | @ema_research
  • 4. Sponsors © 2021 Enterprise Management Associates, Inc. 4 | @ema_research
  • 5. Agenda Introduction: Attackers are Turning up the Heat on Active Directory 1 2 3 Methodology and Demographics Active Directory Security Threats & Challenges 4 Active Directory Security Tools & Tactics 5 Active Directory Risk & Attack Remediation 6 Active Directory Security Priorities & Spending © 2021 Enterprise Management Associates, Inc. 5 | @ema_research
  • 7. Annual Revenue 11% $1M - <$20M 14% $2M - <$100M 43% $100M - <$1B 28% $1B+ Vertical Industries 26% High Technology Software 16% Finance/Banking/Insurance 13% Manufacturing 12% Retail/Wholesale Number of Respondents 250 Geography North America Demographics & Methodology Company Size 37% Large Enterprise 63% SME © 2021 Enterprise Management Associates, Inc. | @ema_research
  • 8. Groups Responsible for Securing Active Directory 8 83% IT Operations 73% Security Operations 48% Network Operations 32% Infrastructure Team 29% Identity Team The Complexity of Securing Active Directory Requires Collaboration Across Groups with Different Levels of Expertise © 2021 Enterprise Management Associates, Inc. | @ema_research
  • 9. © 2021 Enterprise Management Associates, Inc. 9 Over 90% of organizations have 10 or more domain controllers, which represents an exceptionally large attack surface. | @ema_research
  • 11. 11 © 2021 Enterprise Management Associates, Inc. | @ema_research
  • 12. Other up and coming attack types: Silver ticket attack; FoggyWeb backdoor © 2021 Enterprise Management Associates, Inc. 12 | @ema_research
  • 13. What Makes Securing Active Directory so Hard? © 2021 Enterprise Management Associates, Inc. 13 Top Reasons Other Issues lack of visibility to identify exposures no understanding of consequences of changes being made | @ema_research 25% Hard to detect live attacks on AD 21% Too hard to coordinate security across multiple groups 15% Can’t keep up with constant changes in AD
  • 15. Downsides to audit Snapshot in time Downsides to log analysis Time consuming & costly © 2021 Enterprise Management Associates, Inc. 15 | @ema_research
  • 16. Who does the assessments? IT operations 79% Security operations 73% MSP/MSSP 37% Internal Red Team/pen testers 29% Outside auditors/contractors 26% © 2021 Enterprise Management Associates, Inc. 16 | @ema_research
  • 17. © 2021 Enterprise Management Associates, Inc. 17 | @ema_research
  • 18. © 2021 Enterprise Management Associates, Inc. 18 | @ema_research Only 33% look for live attacks targeting Active Directory
  • 19. Active Directory Risk & Attack Remediation
  • 20. How to Determine the Best Remediation Options for Active Directory Exposures © 2021 Enterprise Management Associates, Inc. 20 67% Rely on Active Directory experts 46% Turn to third-party consultants 43% Apply specific tools to help identify the best remediation options 34% Search for remediation options on the internet | @ema_research 20
  • 21. 21 © 2021 Enterprise Management Associates, Inc. | @ema_research
  • 22. Accepting Active Directory Exposures © 2021 Enterprise Management Associates, Inc. 22 | @ema_research
  • 24. 24 © 2021 Enterprise Management Associates, Inc. | @ema_research
  • 25. Future Spending Plans for Active Directory Security © 2021 Enterprise Management Associates, Inc. 25 Top 3 reasons to increase it 25% increase in AD attacks 18% increase in work-from-home activity 17% cloud usage expansion | @ema_research 35% Plan to significantly increase it 51% Plan to slightly increase it 14% Don’t plan to change it
  • 26. Get the report! https://bit.ly/3GKgeqz © 2021 Enterprise Management Associates, Inc. 26 | @ema_research