Identity Crisis: Combating Microsoft 365 Account Takeover at Scale

On-demand

About

Every day in the United States, about $8 million is siphoned from individuals, small businesses, large corporations, and non-profit organizations as a result of business email compromise attacks. These attacks are the symptom of a new rising tide of cloud attack tradecraft. In the cloud, proof of identity is all that you need enough to access private resources, even if that proof is stolen. Welcome to the identity crisis! 

 This talk focuses on how we can cut off attackers during one of the most critical phases of their attacks: initial access. Through technical demonstration of three common initial access attacks, this presentation will cover how we can better approach detection, response, and deterrence of account takeovers.

Webinar
Presenters

Jamie Levy

Director of Adversary Tactics

Jamie Levy is the Director of Adversary Tactics at Huntress. Jamie is also a longtime researcher, developer and board member of the Volatility Foundation. She has worked over 15 years in the digital forensics industry, conducting investigations as well as building out software solutions. Jamie is also a co-author of The Art of Memory Forensics, the first book of its kind covering various facets of how to investigate RAM artifacts.

Matt Kiely

Principal Product Researcher

Theater kid turned Marine turned Windows system administrator turned network administrator turned cyber defender turned malware analyst turned ethical hacker turned offensive security researcher turned red teamer turned arrow maker at Huntress.

Matt Kiely is a Principal Security Researcher at Huntress developing products that hit hackers where it hurts. He currently leads MDR for Microsoft 365 product research. He is a skilled cyber expert with over 10 years of experience in IT and security working for organizations including: Massachusetts Institute of Technology, financial institutions, SimSpace, and the United States Marine Corps. Matt holds a Bachelor of Science in Information Technology from Northeastern University and a Graduate Certificate in Cybersecurity from the Rochester Institute of Technology. Some of Matt's professional credentials include OSCP, eCPPT, eCPTX, CRTO, and CRTP.

Login
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt.
Webinar: Identity Crisis: Combating Microsoft 365 Account Takeover at Scale by Huntress