Fake IDs and Bad Behaviour: Containing Rogue Actors With Mature Threat Detection and Response

Fake IDs and Bad Behaviour: Containing Rogue Actors With Mature Threat Detection and Response

Would your cyber infrastructure stop a threat actor who has multi-factor authentication (MFA) credentials?

In this session, we will explore the expanding market of stolen user credentials and how threat actors are utilising them to bypass MFA.

We will cover the most recent tactics threat actors are using to capture these details, and break down the importance of speed in these scenarios to contain and disrupt attackers before damage can be done.

Finally, we will look at some attack disruption scenarios and a model for gauging your current threat detection & response (TDR) maturity.

Related events

Back to top of the page