Masterclass
Artificial intelligence
Digital Business
Aktuelle Angriffsvektoren auf M365 – Von Adversary-in-the-Middle bis TokenSmith
10.09.2025
12:15 - 13:00
Microsoft Expert Zone | Level 2
From adversary-in-the-middle attacks and compromised authentication flows to advanced techniques like TokenSmith – this session reveals how attackers exploit identities, gain access to resources, and move laterally across the cloud. Using real-world scenarios, participants gain hands-on insights into today’s threat landscape and learn how to effectively secure their Microsoft 365 environment.
Topics & Technologies
Cyber Security
Connectivity & Network