Identity Compromise in Managed Environments
Автор: Seceon Inc
Загружено: 2026-01-21
Просмотров: 84
Описание:
Attackers no longer break in. They log in.
In Session 3 of The 2026 Cyber Battlefield webinar series, we break down how modern threat actors, such as APT29, compromise identities in managed environments and remain hidden for months without deploying malware.
This session walks through real-world techniques used to bypass traditional defenses, including MFA fatigue attacks, session token theft, and abuse of dormant accounts. You will see how attackers blend into normal activity using proxy infrastructure and how Microsoft 365 often becomes a silent surveillance platform once access is gained.
If you manage security for multiple customers or operate in a SOC or MSSP environment, this session highlights why identity attacks are so difficult to detect and why MFA alone is not enough.
What you will learn
How MFA fatigue attacks trick users into approving access
Why session token theft is more dangerous than stolen passwords
How dormant and service accounts enable long-term persistence
How attackers spy through Microsoft 365 without triggering alerts
Why identity-based attacks often go unnoticed in managed environments
This session is essential viewing for security leaders, SOC teams, MSPs, and MSSPs looking to understand how identity compromise really works and what it takes to detect it after login.
Watch now and get ready for Session 4, where we focus on what defenders can do once attackers are already inside.
Повторяем попытку...
Доступные форматы для скачивания:
Скачать видео
-
Информация по загрузке: