Para obter uma melhor experiência web, utilize o IE11+, Chrome, Firefox ou Safari.

Hiding In the Cloud: How attackers can use application consent for sustained persistence and how to find it

Hiding In the Cloud: How attackers can use application consent for sustained persistence and how to find it
Sob demanda
  • Data gravada:Nov. 17, 2020
  • Evento:Sob demanda
Hiding In the Cloud: How attackers can use application consent for sustained persistence and how to find it
Applications – and the way permissions for these applications get granted – are changing. In this session, you’ll understand these new application models and how they can be abused for sustained persistence, how these permissions work, what overprivileged looks like and finally, how to find them in your environment.

Assistir a seu webcast gratuito

Por favor, aguarde...

triangle-down check
Ao fazer o download, você se inscreverá para receber nosso e-mail marketing. Para cancelar sua inscrição, siga as etapas descritas em nossa Política de Privacidade.

reCAPTCHA protege este site. Confira a Política de Privacidade e os Termos de Uso do Google.