For the best web experience, please use IE11+, Chrome, Firefox, or Safari

Hiding In the Cloud: How attackers can use application consent for sustained persistence and how to find it

Hiding In the Cloud: How attackers can use application consent for sustained persistence and how to find it
On Demand
  • Recorded Date:Nov. 17, 2020
  • Event:On Demand
Hiding In the Cloud: How attackers can use application consent for sustained persistence and how to find it
Applications – and the way permissions for these applications get granted – are changing. In this session, you’ll understand these new application models and how they can be abused for sustained persistence, how these permissions work, what overprivileged looks like and finally, how to find them in your environment.

Watch Your Free Webcast

Please wait...

triangle-down check
By downloading, you are registering to receive marketing email from us. To opt-out, follow steps described in our Privacy Policy.

reCAPTCHA protects this site. See Google's Privacy Policy and Terms of Use.