Featured image
Truesec pattern
Tech Talk

[SWE] Protect and manage identities


Protect and manage identities

When an organization is subjected to an intrusion, the attacker in search of better and more useful permissions will try to move between several computers. increased chances of detecting the attacker's activities. We provide examples of measures and what is required for the correct handling of administrative identities in order to make it more difficult to misuse them. Our experts Simon Binder and Hasain Alshakarti will also show what these attacks usually look like.

Key learnings:

  • Learn to identify risks associated with administrative behavior
  • Learn how to think to minimize exposure to administrative privileges


Have a question you want to be answered during our Tech Talk? Mail it to us at t3@truesec.com



Target groups:

C-level, Security managers, IT managers, IT technicians, IT professionals, and for those who work in an IT department and who are interested in security issues.

Get Notified About Upcoming Tech Talks

Sign up to get updated on upcoming Tech Talks and live hacks with leading experts featuring STÖK.