Date:  
Dec 16, 2025
Time:  
11:00 am
EST
CDT

Preventing trusted software exploitation with application containment

Join ThreatLocker CEO Danny Jenkins and Chief Product Officer Rob Allen for a live session focused on Ringfencing™, the critical application containment technology and strategy used to stop the exploitation of trusted software.

Ringfencing is a non-negotiable foundation for achieving Zero Trust and protecting your data from unauthorized access.  

This webinar explores how Application Control forces approved programs to do only what they're supposed to, nothing more, blocking threats that rely on misusing approved, legitimate software to attack your environment.

In this session, you’ll get answers to questions like these:

  • How does Ringfencing ensure that approved applications run unencumbered while simultaneously restricting their access to files, registry keys, network resources, or other applications?  
  • How can you customize an Allowlisting policy to prevent applications like Microsoft Office or PowerShell from launching risky child processes or accessing sensitive high-risk directories?  
  • How can you customize security with precision by allowing an application like PowerShell to run but prevent it from accessing external network destinations?
  • Where does application containment fit within the broader Application Control and Zero Trust strategies, offering protection even against unpatched zero-day exploits?
  • What measured approach ensures that hardening your environment with these controls avoids operational disruption?

Learn from the leaders in Zero Trust.

Watch the webinar to see how Ringfencing enforces least privilege principles against approved application and restricts access to files, registry keys, scripts, and the internet. You’ll leave with clear, practical insight into establishing a proactive defense blueprint, shifting your security focus from responding to potential attacks to blocking them outright.

REGISTER TODAY

WATCH THE WEBINAR

watch the replay

Additional RESOURCES

Access the additional downloadable resource that will help you make the most of this webinar.  

Whether you're starting from zero or organizing an inherited environment, this tactical checklist will help you fully secure your environment step by step.

Webinar Speakers

Hear from our industry experts

Danny Jenkins

Co-founder & CEO of ThreatLocker

Danny Jenkins is the CEO and co-founder of ThreatLocker®, a leading cybersecurity company delivering a comprehensive Zero Trust Platform built to protect organizations from both known and unknown threats. Jenkins is a recognized authority in the cybersecurity industry whose experience includes two decades defending corporate networks, engaging in ethical hacking, and responding to active cyberattacks. He frequently speaks on topics such as ransomware, data breaches, critical infrastructure protection, and best practices for implementing a Zero Trust cybersecurity framework.

Rob Allen

Chief Product Officer

As Chief Product Officer at ThreatLocker, Rob Allen is a highly regarded IT expert with over 20 years of experience in the field. Throughout his career, he has shaped the narrative on how businesses can embrace technology to drive innovation while mitigating cyber risks. With a career rooted in the technical field as a system administrator, technician, and engineer, Allen's hands-on background uniquely positions him to bridge the gap between technical execution and business strategy.

watch more webinars

ThreatLocker open Q&A session
Ask the experts: Live Q&A about Application Allowlisting
Defense Against Configurations: Eliminate breaches caused by misconfigurations

Webinar Speakers

Hear from our industry experts

Danny Jenkins

Co-founder & CEO of ThreatLocker

Danny Jenkins is the CEO and co-founder of ThreatLocker®, a leading cybersecurity company delivering a comprehensive Zero Trust Platform built to protect organizations from both known and unknown threats. Jenkins is a recognized authority in the cybersecurity industry whose experience includes two decades defending corporate networks, engaging in ethical hacking, and responding to active cyberattacks. He frequently speaks on topics such as ransomware, data breaches, critical infrastructure protection, and best practices for implementing a Zero Trust cybersecurity framework.

Rob Allen

Chief Product Officer

As Chief Product Officer at ThreatLocker, Rob Allen is a highly regarded IT expert with over 20 years of experience in the field. Throughout his career, he has shaped the narrative on how businesses can embrace technology to drive innovation while mitigating cyber risks. With a career rooted in the technical field as a system administrator, technician, and engineer, Allen's hands-on background uniquely positions him to bridge the gap between technical execution and business strategy.

FREQUENTLY ASKED QUESTIONS

How many webinars are there in this series?

There are 15 webinars, each approximately one hour long including an audience Q&A. If you put one webinar's recommendations per week, you will complete the series in approximately 100 days.

Who is this series for?

This series is for IT professionals ready to take control of their environment, whether you've just inherited one, are rebuilding from the ground up, or need to scale and secure what’s already in place.

Do I have to watch all 15 webinars sequentially?

No, you can implement the recommendations in all or only a few of the sessions, but we do recommend watching all of them in order, as we often build on the previous week's efforts.

Is there a cost associated with this series?

No, the entire series, including the additional downloadable resources, is completely free.

Do I get a badge or certificate once I complete the webinar series?

Unfortunately, the badge was only available for people who attended the sessions live in May-August 2025.

start Your path to stronger defenses

Get a trial

Try ThreatLocker free for 30 days and experience full Zero Trust protection in your own environment.

Book a demo

Schedule a demo customized to your environment and explore how ThreatLocker aligns with your security goals.

Ask an expert

Just starting to explore our platform? Find out what ThreatLocker is, how it works, and how it’s different.