Cloud Phishing and Access Compromise

  • Thursday, 29 Oct 2020 3:30PM EDT (29 Oct 2020 19:30 UTC)
  • Speaker: Tom Clare

Why break-in when an attacker can login? Cybercrime transformation to cloud-enabled threats and cloud phishing to evade legacy security defenses continues to increase. Attack success leverages trusted domains, valid certificates, and in some cases policies by-passing inline defenses for an optimized user experience. Identity has become the new perimeter in a world of remote working and continued SaaS app adoption. 'Attend this educational webcast to learn the following:

  • Trends for cloud phishing and access compromise
  • Cloud phishing examples and kill chain steps
  • Prevention defenses against cloud phishing
  • Detection defenses for account compromise
  • Future predictions for threat and data protection