
Attackers don’t really “break in” anymore — they log in. And once they do, distinguishing normal user activity from malicious behaviour becomes significantly harder.
Britomart Place, Level 10/11 Auckland Central, Auckland 1010, New Zealand
This joint Vectra AI and Bastion Security threat briefing, From Valid Credentials to Full Control: The Post-Login Kill Chain, is designed for SOC teams responsible for detecting and responding to active threats in real-world environments. The session breaks down the post-login tactics, techniques, and procedures (TTPs) used by groups such as Scattered Spider and Salt Typhoon, highlighting where visibility commonly degrades across identity, network, and cloud control planes.
We’ll cover:
