Attackers keep hammering cloud-based identities to help them bypass endpoint and network defenses, logging in using inadvertently exposed credentials - or ones harvested through infostealers - then escalating access thanks to over-permissioned accounts, experts warn.
Join your peers and expand your network at closed-door sessions as we debate on the most pressing issues facing security professionals today. Meet-ups are scheduled daily and limited to 6-8 participants.