How modern intrusions unfold inside hybrid identity environments and how to detect them before business impact.
This is a practitioner-level breakdown of how real campaigns unfold and how detection teams can shift left.
IOFFICE Business Center, Kungsgatan 6, Stockholm
They authenticate.
They use valid accounts.
They leverage trusted workflows.
They move across AD, Entra, SaaS, cloud, and data center without triggering traditional controls.
By the time ransomware executes or data leaves the environment, the attacker has often been operating in plain sight for days.
If your detection strategy starts at payload execution, you are already late.
13:00 to 14:00
Optional networking lunch
14:00 to 17:30
Technical sessions
17:30 onward
Peer networking
This event is designed for:
If you think in terms of attack paths, telemetry quality, and dwell time reduction, this session is for you.
This is a focused, practitioner-level event, not a mass webinar.
If you are responsible for reducing dwell time and closing identity-driven detection gaps, join us in Stockholm.