#1695623: Identity attacks have changed — have your IR playbooks? - August 13th & 14th 2025
Description: |
Identity attacks have changed a lot in recent years, which means how security teams investigate and respond to them has had to adapt. A compromised identity was once just part of a system compromise, and the scope of detection and response was focused on the organization’s Active Directory domain. Now, identity attacks happen beyond traditional on-premise networks, impacting cloud identities that are created, used, and attacked in the browser. Modern identity sprawl and configuration complexity has changed the nature of the beast. Push Security’s Josh Gideon went from executing sophisticated identity attacks as a Security Consultant to defending against them on the front lines as Director of Security Operations. Join him for our latest webinar where he’ll take you through: How identity attacks have evolved from the days of AD attacks. What investigation and response used to look like, and the challenges that modern identity brings to traditional tools and processes. Step-by-step walkthrough of using the Push platform to investigate and respond to modern identity attack scenarios, from analyzing the timeline of a browser-based phishing attack, to investigating the blast radius of a compromised identity. Automations and use-cases that Push customers have built using browser telemetry to detect and respond to attacks and remediate identity vulnerabilities. Can't make it live? Sign up anyway and you'll receive a copy of the recording in your inbox. You don’t want to miss this one! |
---|---|
More info: | https://pushsecurity.com/webinar/identity-detection-response?utm_campaign=16827822-FY25Q3-webinar-detections&utm_source=bleepingcomputer&utm_medium=sponsored-content&utm_content=in-index |
Date added | Aug. 2, 2025, 9:03 a.m. |
---|---|
Source | push security |
Subjects | |
Venue | Aug. 13, 2025, midnight - Aug. 14, 2025, midnight |