Session
Hunt the Tokens - Uncovering Post-Authentication Attacks Across Your Environment
With the increasing number of attacks involving token theft and replay, incorporating post-authentication attacks into your Identity Threat Detection and Response (ITDR) is crucial. However, detecting and hunting of those attacks across various data sources and signals can be a significant challenge. In this session, we will explore how to correlate authentication and activity logs to track the usage of issued tokens effectively. Additionally, we will delve into the details of enriching the data to identify unusual or sensitive access and operations. Enhance your hunting skills to track user and workload activities and detect those sophisticated token-based threats.
Thomas Naunheim
Microsoft MVP | Cyber Security Architect @glueckkanja AG
Koblenz, Germany
Links
Please note that Sessionize is not responsible for the accuracy or validity of the data provided by speakers. If you suspect this profile to be fake or spam, please let us know.
Jump to top