IAM Hour of Happy
Details
We’ll cover Entra, attacker visibility, and remediation. Including how to leverage Microsoft Graph to map identity relationships and uncover paths for lateral movement and exploitation.
Related topics
Events in Chicago, IL
Cloud Security
Cybersecurity
Identity & Access Management
Information Security
Technology Professionals
