Masterclass Artificial intelligence Digital Business

Aktuelle Angriffsvektoren auf M365 – Von Adversary-in-the-Middle bis TokenSmith

10.09.2025
12:15 - 13:00
Microsoft Expert Zone | Level 2

From adversary-in-the-middle attacks and compromised authentication flows to advanced techniques like TokenSmith – this session reveals how attackers exploit identities, gain access to resources, and move laterally across the cloud. Using real-world scenarios, participants gain hands-on insights into today’s threat landscape and learn how to effectively secure their Microsoft 365 environment.

Topics & Technologies
Cyber Security Connectivity & Network

Your sources of inspiration

The minds that provide you with fresh ideas and new perspectives.

Powered by Partner

The innovators behind this session.

Microsoft
Microsoft