Attendee Info & Inquiries
You’ve hardened your environment but ignored the attackers’ favorite target. From the creators of BloodHound, learn how attackers see your environment and how they use initial access to move from cloud to on-prem and back again with ease. This session outlines the challenge of attack paths in hybrid environments and how you can reduce your identity risk with Attack Path Management.