Speakers
Danny Jenkins
CEO & co-founder,
ThreatLocker
Rob Allen
CPO,
ThreatLocker
This webinar, led by ThreatLocker, is a practical deep dive into ThreatLocker Ringfencing™ and how it limits what trusted applications are allowed to do once they are running. This session explores how to reduce attack surface by restricting applications from accessing files, the internet, registry locations, and other processes they do not need. Speakers walk through real-world examples, including PowerShell, Microsoft Office, browsers, and common utilities, and demonstrate how Ringfencing can stop exploitation even when vulnerabilities or backdoors exist. Live demos also show how to build, test, and refine Ringfencing policies without breaking legitimate workflows.
What you will learn:
How Ringfencing reduces risk after execution, even for trusted software. See how to identify what an application actually needs for access, how to use auto-population and monitoring to build accurate policies, and how to avoid over-permissive configurations. The session also covers how to restrict dangerous tools, how to prevent applications from launching other high-risk processes, and how to contain exploitation paths that antivirus cannot see.
Key topics covered:
CEO & co-founder,
ThreatLocker
CPO,
ThreatLocker
Email us at [email protected]