Vectra AI
Attack labs
Hosted by
No items found.

SWE Attack Sweden

How modern intrusions unfold inside hybrid identity environments and how to detect them before business impact.

Join fellow SOC leaders and security architects in Stockholm for a technical, attacker-focused deep dive into:

  • Identity-based initial access
  • Post-login persistence and privilege escalation
  • Hybrid lateral movement across cloud and on-prem
  • Where early intent reveals itself in telemetry
  • Why EDR-first detection models miss the beginning

This is a practitioner-level breakdown of how real campaigns unfold and how detection teams can shift left.

April 22, 2026
14:00 to 17:30 onward (optional lunch from 13:00)

IOFFICE Business Center, Kungsgatan 6, Stockholm

Register Now
Thank you for registering!
We've received your request and will get back to you soon.

If you do not hear from us in the next 48 hours, please check your spam folder!
Back to homepage

Modern attacks do not break in

They authenticate.
They use valid accounts.
They leverage trusted workflows.
They move across AD, Entra, SaaS, cloud, and data center without triggering traditional controls.
By the time ransomware executes or data leaves the environment, the attacker has often been operating in plain sight for days.
If your detection strategy starts at payload execution, you are already late.

Agenda at a glance

13:00 to 14:00
Optional networking lunch

14:00 to 17:30
Technical sessions

  • Initial Access: Identity as the Entry Point
  • The Post-Login Kill Chain
  • Real-World Investigation: Inside a Hybrid Identity Breach
  • Early Detection and Containment: Finding Intent Before Impact

17:30 onward
Peer networking

Who should attend

This event is designed for:

  • SOC leads responsible for detection strategy
  • Security architects designing hybrid visibility
  • Detection and response engineers tuning analytics
  • Technical security decision-makers reassessing control effectiveness

If you think in terms of attack paths, telemetry quality, and dwell time reduction, this session is for you.

What you will walk away with

  • A clearer understanding of how modern intrusions unfold after authentication
  • A structured approach to analyzing identity-centric attack paths
  • Insight into where hybrid detection strategies commonly fail
  • Practical detection considerations you can apply immediately
  • Peer discussion grounded in real breach anatomy

Seats are limited

This is a focused, practitioner-level event, not a mass webinar.

If you are responsible for reducing dwell time and closing identity-driven detection gaps, join us in Stockholm.

Share

Meet the Team

No items found.