Vectra AI
Attack labs
Hosted by
No items found.

[Threat Briefing] The Post-Login Kill Chain: How Attackers Move Once They’re In

Attackers don’t really “break in” anymore — they log in. And once they do, distinguishing normal user activity from malicious behaviour becomes significantly harder.

February 18, 2026
11:30am - 1:30pm NZDT

Britomart Place, Level 10/11 Auckland Central, Auckland 1010, New Zealand

Thank you for registering!
We've received your request and will get back to you soon.

If you do not hear from us in the next 48 hours, please check your spam folder!
Back to homepage

This joint Vectra AI and Bastion Security threat briefing, From Valid Credentials to Full Control: The Post-Login Kill Chain, is designed for SOC teams responsible for detecting and responding to active threats in real-world environments. The session breaks down the post-login tactics, techniques, and procedures (TTPs) used by groups such as Scattered Spider and Salt Typhoon, highlighting where visibility commonly degrades across identity, network, and cloud control planes.

We’ll cover:

  • Real-world post-auth kill chain behaviors: identity discovery, privilege escalation, lateral movement, token/OAuth persistence, and data staging
  • Common blind spots: SSO/session telemetry gaps, SaaS audit log limitations, token visibility, and cross-domain correlation
  • What “good” looks like: behavioral baselines, anomaly thresholds, and high-fidelity post-login detections
  • MTTD/MTTR improvements: alert consolidation, playbooks, session revocation, MFA method hygiene, and rapid scoping
  • Case-based lessons on how dwell time drives operational disruption and extended recovery (e.g., Jaguar Land Rover)

Share

Meet the Team

Steve Carlin
Senior Security Engineer