Session

Hacking and Defending Microsoft Entra: A Real-World Survival Guide

Welcome to the front lines of Identity Security. In this session, we move beyond theory to simulate real-world attacks against Microsoft Entra in a live lab environment.
We will dissect the anatomy of a modern attack, walking through every stage of the kill chain—from initial reconnaissance and access to privilege escalation and lateral movement. You won’t just see how attacks happen; you will learn how to stop them.
What we will cover:
• Real-world simulations: Adversary-in-the-Middle (AiTM), Device Code Flow phishing, and AAD Connect exploits.
• The Defender’s Playbook: Mapping specific Microsoft Entra defenses to each attack vector.
• Future-Proofing: Implementing the 2024 Zero Trust model based on Microsoft’s ZTNA architecture.
Join us to upgrade your security posture and leave with actionable strategies to bulletproof your Microsoft Entra environment.

Seyfallah Tagrerout

Cloud Security Architect -Microsoft Regional Director & Microsoft MVP Security

Genève, Switzerland

Actions

Please note that Sessionize is not responsible for the accuracy or validity of the data provided by speakers. If you suspect this profile to be fake or spam, please let us know.

Jump to top