Securing M365 Data and Identity Systems Against Modern Adversaries

Register Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log in
Sign up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.

Your password should:

  • be at least eight characters long
  • be no more than 25 characters long
  • contain at least one uppercase, lowercase and special character
  • contain at least one digit
  • only contain alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

Standard Microsoft 365 data protection is failing against modern adversaries who weaponize compromised identities. With ransomware attacks on Microsoft customers surging 275% year-over-year, true cyber resilience requires more than just backup, it demands a strategy that unifies data security with robust identity recovery.

In this session, we will dissect how threat actors, such as Scattered Spider, exploit gaps between identity and access management (IAM) and data storage to paralyze organizations.

We will move beyond high-level theory to specific, practical strategies for proactive data security posture management (DSPM) and orchestrated Active Directory/Entra ID recovery.

Join this webinar to:

  • Understand modern identity-based tactics: Move beyond general ransomware trends to understand specifically how modern adversaries are weaponizing valid credentials in Active Directory and Entra ID to bypass traditional M365 defenses
  • Close the identity-data gap: Most organizations have separate strategies for IAM and data protection. This session addresses the critical vulnerability that exists between them, explaining why recovering data is impossible without first recovering the identity system cleanly
  • Shift from reactive to proactive: Learn how DSPM is evolving from a compliance checkbox into a proactive tool for reducing the blast radius of an attack before it happens

Speakers

Photo of Ivan Alba

Ivan Alba

Application Solutions Architect, Rubrik

Brought to you by

Should you watch this webinar your information may be shared with the sponsors indicated above. Please see the privacy policy for Rubrik here: https://www.rubrik.com/legal/privacy-policy. Please see Infosecurity Magazine’s privacy policy for more information.