Friday 21 February 2025, 11am-12noon (GMT)
Would your cyber infrastructure stop a threat actor who has multi-factor authentication (MFA) credentials?
In this session, we explored the expanding market of stolen user credentials and how threat actors are utilising them to bypass MFA.
We covered the most recent tactics threat actors are using to capture these details, and break down the importance of speed in these scenarios to contain and disrupt attackers before damage can be done.
Finally, we looked at some attack disruption scenarios and a model for gauging your current threat detection & response (TDR) maturity.
Guest chaired by
Amanda Coleman (info), Director, Amanda Coleman Communications
Presented by
Dominic Carroll (info), Director of Portfolio, e2e-assure
