Zeki Turedi
Name
KEYNOTE | Behind Enemy Lines: How Adversaries Exploit Identity
Description

Identity has become the prime target for modern cyber adversaries, enabling them to bypass traditional defenses and move laterally with ease. But what does an identity-based attack actually look like from an adversary’s perspective?

In this session, we’ll break down the key tactics used by attackers—from credential theft and abuse to session hijacking and privilege escalation.
Using real-world case studies, we’ll show how adversaries exploit identity gaps and, more importantly, how defenders can disrupt them before it’s too late.

Date & Time
Wednesday, May 14, 2025, 1:00 PM - 1:45 PM
Theater
Keynote

Slides from the presentation will be visible on this site if the speaker in question wishes to share them.
Please note that you need to be signed in in order to see them.