Main Navigation Section

Hiding In the Cloud: How attackers can use application consent for sustained persistence and how to

Event Details

On Demand
  • Recorded Date:Nov. 17, 2020
Applications – and the way permissions for these applications get granted – are changing. In this session, you’ll understand these new application models and how they can be abused for sustained persistence, how these permissions work, what overprivileged looks like and finally, how to find them in your environment.

Event Details

On Demand
  • Recorded Date:Nov. 17, 2020

Watch Your Free Webcast

group2

By downloading, you are registering to receive marketing email from us. To opt-out, follow steps described in our Privacy Policy.

reCAPTCHA protects this site. See Google's Privacy Policy and Terms of Use.

Share