Fake IDs and bad behaviour: Containing rogue actors with mature TDR | SASIG
Forgotten your password?

Friday 21 February 2025, 11am-12noon (GMT)

Would your cyber infrastructure stop a threat actor who has multi-factor authentication (MFA) credentials?

In this session, we explored the expanding market of stolen user credentials and how threat actors are utilising them to bypass MFA.

We covered the most recent tactics threat actors are using to capture these details, and break down the importance of speed in these scenarios to contain and disrupt attackers before damage can be done.

Finally, we looked at some attack disruption scenarios and a model for gauging your current threat detection & response (TDR) maturity.

 

Guest chaired by

Amanda Coleman (info), Director, Amanda Coleman Communications

 

Presented by

Dominic Carroll (info), Director of Portfolio, e2e-assure

Log in to watch the webinar on demand


Log in here
This website uses cookies, by continuing to use the site you agree to using cookies. Continue