Skip to content

Details

We’ll cover Entra, attacker visibility, and remediation. Including how to leverage Microsoft Graph to map identity relationships and uncover paths for lateral movement and exploitation.

Events in Chicago, IL
Cloud Security
Cybersecurity
Identity & Access Management
Information Security
Technology Professionals

Members are also interested in