Skip to content

Details

We’ll cover Entra, attacker visibility, and remediation. Including how to leverage Microsoft Graph to map identity relationships and uncover paths for lateral movement and exploitation.

Whether you're leading IAM initiatives or tackling day-to-day identity risk, this is your chance to connect with peers and gain practical insights.

Hope to see you there!

Members are also interested in