Skip to main content
March 3, 2026 12:00 PM - 1:00 PM ET
Register here

About the Event

This webinar, led by ThreatLocker, is a practical deep dive into ThreatLocker Ringfencing™ and how it limits what trusted applications are allowed to do once they are running. The session explores how to reduce attack surface by restricting applications from accessing files, the internet, registry locations, and other processes they do not need. Speakers will walk through real-world examples, including PowerShell, Microsoft Office, browsers, and common utilities, and demonstrate how Ringfencing can stop exploitation even when vulnerabilities or backdoors exist. Live demos will also show how to build, test, and refine Ringfencing policies without breaking legitimate workflows.

What you will learn:

How Ringfencing reduces risk after execution, even for trusted software. See how to identify what an application actually needs for access, how to use auto-population and monitoring to build accurate policies, and how to avoid over-permissive configurations. The session also covers how to restrict dangerous tools, how to prevent applications from launching other high-risk processes, and how to contain exploitation paths that antivirus cannot see.

Key topics covered:

  • How Ringfencing limits application access to files, registry, network destinations, and other processes
  • How vulnerabilities and backdoors can be neutralized by restricting application behavior
  • How to use auto-population, monitoring, and simulation to build safe Ringfencing policies
  • How to contain high-risk tools like PowerShell, Office, browsers, and legacy applications
  • How to reduce attack surface without slowing down users or breaking business workflows

Request a demo to see how ThreatLocker can strengthen your defenses across applications, configurations, and every endpoint you manage.

Speakers

Danny Jenkins

CEO & co-founder

ThreatLocker

Rob Allen

CPO

ThreatLocker

Questions?

Email us at [email protected]