Featured image
Truesec pattern
Tech Talk

[SWE] Protect and Manage Identities


Protect and Manage Identities

When an organization is subjected to an intrusion, the attacker, in search of better and more useful permissions, will try to move between several computers, increasing the chances of detecting the attacker's activities. We provide examples of measures and what is required for the correct handling of administrative identities to make it more difficult to misuse them. Our experts, Simon Binder and Hasain Alshakarti will also show what these attacks usually look like.

Key Learnings

  • Learn to identify risks associated with administrative behavior.
  • Learn how to think to minimize exposure to administrative privileges.


Have a question you want to be answered during our Tech Talk? Please email it to us at t3@truesec.com.



Who It's For

C-Levels, Security managers, IT managers, IT technicians, IT professionals, and those who work in an IT department and are interested in security issues.

Get Notified About Upcoming Tech Talks

Stay ahead in cyber

Join 1000+ other cyber professionals that get monthly updates from us with the key things to know.