For the best web experience, please use IE11+, Chrome, Firefox, or Safari

Hiding In the Cloud: How attackers can use application consent for sustained persistence and how to find it

Hiding In the Cloud: How attackers can use application consent for sustained persistence and how to find it
On Demand
  • Recorded Date:Nov. 17, 2020
  • Event:On Demand
Hiding In the Cloud: How attackers can use application consent for sustained persistence and how to find it
Applications – and the way permissions for these applications get granted – are changing. In this session, you’ll understand these new application models and how they can be abused for sustained persistence, how these permissions work, what overprivileged looks like and finally, how to find them in your environment.