Zeki Turedi
Navn
KEYNOTE | Behind Enemy Lines: How Adversaries Exploit Identity
Beskrivelse

Identity has become the prime target for modern cyber adversaries, enabling them to bypass traditional defenses and move laterally with ease. But what does an identity-based attack actually look like from an adversary’s perspective?

In this session, we’ll break down the key tactics used by attackers—from credential theft and abuse to session hijacking and privilege escalation.
Using real-world case studies, we’ll show how adversaries exploit identity gaps and, more importantly, how defenders can disrupt them before it’s too late.

Dato & Tid
onsdag den 14. maj 2025, 13.00 - 13.45
Sal
Keynote

Slides fra seminaret vil være synlige på denne side, hvis den pågældende taler ønsker at dele dem. Bemærk venligst, at du skal være logget ind for at se dem.