Introduction to ADCS Exploitation w/ Alyssa Snow & Kaitlyn Wimberley

1.1. Does your organization use Active Directory Certificate Services?
2.Does your organization use Sentinel?
3.Do monitor and log ADCS events?
4.Have you ever had a penetration test?
5.How confident are you in the Role Based Access Controls (RBAC) implemented for Active Directory Certificate Services?
6.Which most accurately describes your current role?
7.What tools and processes do you use to monitor and manage AD CS?
8.Anything ADCS related that you hope to see in a future BHIS webcast?