BEGIN:VCALENDAR
VERSION:2.0
X-WR-CALNAME:BrightTALK Event
PRODID:-//BrightTALK//NONSGML BrightTALK Event Calendar//EN
CALSCALE:GREGORIAN
METHOD:REQUEST
BEGIN:VEVENT
UID:https://www.quest.com/webcast-hub?commid=667459
DTSTAMP:20260511T201220Z
ORGANIZER:MAILTO:noreply@brighttalk.com
LOCATION:BrightTALK
URL:https://www.quest.com/webcast-hub?commid=667459&utm_campaign=commu
 nication_reminder_24hr_registrants&utm_medium=calendar&utm_source=brig
 httalk-transact
DTSTART:20260519T150000Z
DTEND:20260519T154500Z
SUMMARY:Live webcast: Beyond Detection - Episode 1: Understanding Iden
 tity Risk Before It Becomes Compromise
DESCRIPTION:Click here to attend: https://www.quest.com/webcast-hub?co
 mmid=667459&utm_campaign=communication_reminder_24hr_registrants&utm_m
 edium=calendar&utm_source=brighttalk-transact\n\nPresenter: Bryan Patt
 on, Quest Software\n\nIdentity has become the primary target for moder
 n cyberattacks, making clear visibility into identity risk more critic
 al than ever. Across Active Directory and Entra ID, years of organic g
 rowth, misconfigurations, and hidden privilege create a complex web of
  access that’s difficult to see and even harder to secure.\n\nAs the f
 irst step in building identity resilience, organizations must understa
 nd where risk exists before it’s exploited. Attackers take advantage o
 f limited visibility, leveraging identity relationships, Tier 0 exposu
 re, and attack paths to move undetected and gain control without trigg
 ering traditional defenses. \n\nJoin us as we break down how to uncove
 r and understand your identity attack surface, including:\n• How to ma
 p your identity infrastructure across AD and Entra\n• Where hidden pri
 vilege and Tier 0 risks typically exist\n• How attackers discover and 
 exploit identity attack paths
SEQUENCE:1779115874
END:VEVENT
END:VCALENDAR
