The True Threat to Identity by Modern Attackers
Today's attacker doesn't break in, he logs in. In more than 80% of modern attacks, attackers used valid user credentials to gain access to a system. The question of whether an attacker already has the key to your environment in their hands should therefore be much greater than worrying about zero days or phishing.
In this presentation, you will learn more about:
- the primary attack vector
- the attack techniques used by state and criminal actors
- Best practice to ensure identity security.