Once attackers get in, identity becomes the attack path. Instead of malware, adversaries use legitimate credentials, native protocols, and trusted relationships to move laterally across Active Directory, cloud identity providers, and service accounts—often undetected.
In this technical session, learn how to detect and stop identity-driven attacks in real time using inline controls—without agents or app changes.
What you’ll learn:
- How attackers exploit identity after initial access
- Where IAM, PAM, and MFA gaps still exist
- Real-world techniques from Scattered Spider (Octo Tempest)
- How to detect and contain lateral movement live
- Securing non-human identities and AI agents
Featuring Nick Cavalancia (Microsoft MVP) & Roy Akerman (Silverfort)
Learn how to turn identity into a true security control plane