Skip to main content

About the Event

This webinar, led by ThreatLocker, is a practical deep dive into ThreatLocker Ringfencing™ and how it limits what trusted applications are allowed to do once they are running. This session explores how to reduce attack surface by restricting applications from accessing files, the internet, registry locations, and other processes they do not need. Speakers walk through real-world examples, including PowerShell, Microsoft Office, browsers, and common utilities, and demonstrate how Ringfencing can stop exploitation even when vulnerabilities or backdoors exist. Live demos also show how to build, test, and refine Ringfencing policies without breaking legitimate workflows.

What you will learn:

How Ringfencing reduces risk after execution, even for trusted software. See how to identify what an application actually needs for access, how to use auto-population and monitoring to build accurate policies, and how to avoid over-permissive configurations. The session also covers how to restrict dangerous tools, how to prevent applications from launching other high-risk processes, and how to contain exploitation paths that antivirus cannot see.

Key topics covered:

  • How Ringfencing limits application access to files, registry, network destinations, and other processes
  • How vulnerabilities and backdoors can be neutralized by restricting application behavior
  • How to use auto-population, monitoring, and simulation to build safe Ringfencing policies
  • How to contain high-risk tools like PowerShell, Office, browsers, and legacy applications
  • How to reduce attack surface without slowing down users or breaking business workflows

Speakers

Danny Jenkins

CEO & co-founder,

ThreatLocker

Rob Allen

CPO,

ThreatLocker

Questions?

Email us at [email protected]