Register for the webinar
Register here
Register to watch on-demand
Thank you for registering!
We've received your request and will get back to you soon.

If you do not hear from us in the next 48 hours, please check your spam folder!
We're excited to have you join us on June 27th!
Back to homepage
Vectra AI Identity

Navigating Identity Security: How TTI uses Vectra AI for Identity to Reduce Identity Exposure

Join us for a 30-min Identity security chat with Eduardo Ortiz Romeu, Group VP of Cybersecurity at TTI on latest attacker techniques, and how to best defend against them.

30 minutes
June 27, 2024
8am PDT / 11am EST / 5pm CET
Webinar
Vectra AI Identity
On-demand Webinar

Navigating Identity Security: How TTI uses Vectra AI for Identity to Reduce Identity Exposure

Join us for a 30-min Identity security chat with Eduardo Ortiz Romeu, Group VP of Cybersecurity at TTI on latest attacker techniques, and how to best defend against them.

30 minutes
June 27, 2024
8am PDT / 11am EST / 5pm CET
Vectra AI Identity

Navigating Identity Security: How TTI uses Vectra AI for Identity to Reduce Identity Exposure

Join us for a 30-min Identity security chat with Eduardo Ortiz Romeu, Group VP of Cybersecurity at TTI on latest attacker techniques, and how to best defend against them.

30 minutes
June 27, 2024
8am PDT / 11am EST / 5pm CET

Navigating Identity Security: How TTI uses Vectra AI for Identity to Reduce Identity Exposure

Join us for a 30-min Identity security chat with Eduardo Ortiz Romeu, Group VP of Cybersecurity at TTI on latest attacker techniques, and how to best defend against them.

30 minutes
June 27, 2024
8am PDT / 11am EST / 5pm CET

Navigating Identity Security: How TTI uses Vectra AI for Identity to Reduce Identity Exposure

Join us for a 30-min Identity security chat with Eduardo Ortiz Romeu, Group VP of Cybersecurity at TTI on latest attacker techniques, and how to best defend against them.

30 minutes
June 27, 2024
8am PDT / 11am EST / 5pm CET

Navigating Identity Security: How TTI uses Vectra AI for Identity to Reduce Identity Exposure

Join us for a 30-min Identity security chat with Eduardo Ortiz Romeu, Group VP of Cybersecurity at TTI on latest attacker techniques, and how to best defend against them.

30 minutes
June 27, 2024
8am PDT / 11am EST / 5pm CET
Register for a free webinar
Register for a free on-demand webinar
Thank you for registering!
We're excited to have you join us on June 27th!
We've received your request and will get back to you soon.

If you do not hear from us in the next 48 hours, please check your spam folder!
Back to homepage

Attackers no longer hack in, they log in. In this Identity security fireside chat, hear directly from Vectra AI customer Eduardo Ortiz Romeu, Group VP of Cybersecurity at TTI, and learn:

  • The latest trends in identity security and hybrid attack techniques: From Scattered Spider to Midnight Blizzard or APT29, attackers have proven ways to bypass preventative measures such as MFA or EDR to commence identity centric attacks
  • How to calculate your organization's Identity Exposure: Learn more about your organization's identity exposure using Vectra AI's identity exposure calculator. Eduardo shares his thoughts on emerging identity focused attacks and challenges in identity security.
  • How Vectra AI for Identity can help reduce your organization's identity exposure: See Vectra AI platform in action in mitigating the risk of account compromise so that you can detect attackers the moment they compromise and hunt for the ones that are already in.

If you have questions, feel free to contact your Vectra AI customer representative or Partner Manager for more information.

Share

Summary

Attackers no longer hack in, they log in. In this Identity security fireside chat, hear directly from Vectra AI customer Eduardo Ortiz Romeu, Group VP of Cybersecurity at TTI, and learn:

  • The latest trends in identity security and hybrid attack techniques: From Scattered Spider to Midnight Blizzard or APT29, attackers have proven ways to bypass preventative measures such as MFA or EDR to commence identity centric attacks
  • How to calculate your organization's Identity Exposure: Learn more about your organization's identity exposure using Vectra AI's identity exposure calculator. Eduardo shares his thoughts on emerging identity focused attacks and challenges in identity security.
  • How Vectra AI for Identity can help reduce your organization's identity exposure: See Vectra AI platform in action in mitigating the risk of account compromise so that you can detect attackers the moment they compromise and hunt for the ones that are already in.

If you have questions, feel free to contact your Vectra AI customer representative or Partner Manager for more information.

Share

Speakers

Speakers

Speakers

Speakers

Speakers

Speakers

Eduardo Ortiz Romeu
Host
Group VP Cybersecurity at TTI
John Mancini
Host
Product Management at Vectra AI

Vectra AI is the leader in Security AI-driven hybrid cloud threat detection and response. Only Vectra platform and services cover public cloud, SaaS applications, identity systems and network infrastructure – both on-premises and cloud-based. Organizations worldwide rely on the Vectra platform and services for resilience to ransomware, supply chain compromise, identity takeovers, and other cyberattacks impacting their organization.

For more information, visit vectra.ai

Vectra AI is the leader in Security AI-driven hybrid cloud threat detection and response. Only Vectra platform and services cover public cloud, SaaS applications, identity systems and network infrastructure – both on-premises and cloud-based. Organizations worldwide rely on the Vectra platform and services for resilience to ransomware, supply chain compromise, identity takeovers, and other cyberattacks impacting their organization.

For more information, visit vectra.ai

FAQs

Who should join the hunt?

This competition is open to all threat hunters. This is a more advanced challenge, so experience with threat hunting and investigation will set you up for success!

How long does it take to complete? Do I need to finish it in one session?

The challenge will take approximately 10 hours to complete. You can log in at any time during the 4 weeks of the challenge and pick up right where you left off.

How does scoring work?

The objective is to collect as many points as possible. Points will accumulate on the Scoreboard.

This is a jeopardy-style format. The higher the points available – the harder the challenge. Some challenges unlock additional challenges to capture more points. Most challenges do offer hints, but hints will cost you points.

Can I invite others to join?

Yes! Invite your colleagues to join in on the fun. The challenge is open to threat hunters around the world and everyone has a chance to win.