У нас вы можете посмотреть бесплатно Identity Compromise in Managed Environments или скачать в максимальном доступном качестве, видео которое было загружено на ютуб. Для загрузки выберите вариант из формы ниже:
Если кнопки скачивания не
загрузились
НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если возникают проблемы со скачиванием видео, пожалуйста напишите в поддержку по адресу внизу
страницы.
Спасибо за использование сервиса ClipSaver.ru
Attackers no longer break in. They log in. In Session 3 of The 2026 Cyber Battlefield webinar series, we break down how modern threat actors, such as APT29, compromise identities in managed environments and remain hidden for months without deploying malware. This session walks through real-world techniques used to bypass traditional defenses, including MFA fatigue attacks, session token theft, and abuse of dormant accounts. You will see how attackers blend into normal activity using proxy infrastructure and how Microsoft 365 often becomes a silent surveillance platform once access is gained. If you manage security for multiple customers or operate in a SOC or MSSP environment, this session highlights why identity attacks are so difficult to detect and why MFA alone is not enough. What you will learn How MFA fatigue attacks trick users into approving access Why session token theft is more dangerous than stolen passwords How dormant and service accounts enable long-term persistence How attackers spy through Microsoft 365 without triggering alerts Why identity-based attacks often go unnoticed in managed environments This session is essential viewing for security leaders, SOC teams, MSPs, and MSSPs looking to understand how identity compromise really works and what it takes to detect it after login. Watch now and get ready for Session 4, where we focus on what defenders can do once attackers are already inside.