Protecting the Identity-Based Attack Life Cycle
Course
Marco Magnaguagno of Semperis and Michele Fabbri of De Nora share insights on securing identity infrastructure across multinational operations, addressing the complete identity-based attack life cycle.
Ninety percent of cyberattacks target identity systems, making Active Directory the crown jewel for attackers seeking to compromise organizations. Traditional security approaches fail to address the complete attack life cycle, leaving critical vulnerabilities exposed throughout the identity infrastructure.
In this session, Marco Magnaguagno, senior solutions architect at Semperis, and Michele Fabbri, group ICT director and CISO at De Nora, will share real-world insights on securing identity infrastructure across multinational operations. They will discuss how identity theft through email phishing campaigns targeting executives creates pathways for data exfiltration and infrastructure disruption, and why traditional perimeter defenses are insufficient against sophisticated identity-based attacks.
Key takeaways include implementing "Trust but Verify" governance models for distributed teams, reducing recovery time objectives from hours to minutes, and establishing visibility into identity modifications that typically go undetected in standard Active Directory environments.
Here is the course outline:
Protecting the Identity-Based Attack Life Cycle Before, During and After an Attack |
Completion
The following certificates are awarded when the course is completed:
![]() |
CPE Credit Certificate |