Main Navigation Section

Hiding In the Cloud: How attackers can use application consent for sustained persistence and how to

Detalhes do evento

Sob demanda
  • Data gravada:Nov. 17, 2020
Applications – and the way permissions for these applications get granted – are changing. In this session, you’ll understand these new application models and how they can be abused for sustained persistence, how these permissions work, what overprivileged looks like and finally, how to find them in your environment.

Detalhes do evento

Sob demanda
  • Data gravada:Nov. 17, 2020

Watch Your Free Webcast

group2

Ao fazer o download, você se inscreverá para receber nosso e-mail marketing. Para cancelar sua inscrição, siga as etapas descritas em nossa Política de Privacidade.

reCAPTCHA protege este site. Confira a Política de Privacidade e os Termos de Uso do Google.

Compartilhe