Masterclass
                    
                                                                        
                                
                                Artificial intelligence
                            
                                                    
                                
                                Digital Business
                            
                                                            
                
                Aktuelle Angriffsvektoren auf M365 – Von Adversary-in-the-Middle bis TokenSmith
                                    
                                    
                                    10.09.2025
                                
                            
                                                            
                                    
                                    
                                    
                                        12:15 - 13:00
                                    
                                
                            
                                                                                                                            
                                                                                                    
                                
                                    
                                    
                                    
                                        Microsoft Expert Zone | Level 2
                                    
                                
                                                    From adversary-in-the-middle attacks and compromised authentication flows to advanced techniques like TokenSmith – this session reveals how attackers exploit identities, gain access to resources, and move laterally across the cloud. Using real-world scenarios, participants gain hands-on insights into today’s threat landscape and learn how to effectively secure their Microsoft 365 environment.
Topics & Technologies
                            
                                                                                                        
                                        Cyber Security
                                    
                                                                                                        
                                        Connectivity & Network