Attacking and Defending the Microsoft Cloud (Office 365 & Azure AD)

Thursday, July 1, 2021

11:00 AM - 12:00 PM PDT

60 minutes, including Q&A

The allure of the "Cloud" is indisputable. Organizations are moving into the cloud at a rapid pace. Even companies that have said no to the Cloud in the past have started migrating services and resources. The Cloud is a new paradigm, and the rapid update pace makes it difficult to keep up, especially when it comes to security.

This presentation focuses on the Microsoft Cloud (Azure AD & Microsoft Office 365) and explores the most common attacks against the Cloud and describes effective defenses and mitigation. While the content is focused on the Microsoft Cloud, some of the attack and defense topics are applicable to other cloud providers and are noted where applicable.

Key items covered:

  • Attacks against the Cloud (including "Solarigate" attacks)
  • Methods to detect attack activity
  • Securing cloud infrastructure against attacks

Brought to you by:

Adaptive Shield

Guest Presenter:

Sean Metcalf

Founder and CTO


Sean Metcalf is founder and CTO at Trimarc (TrimarcSecurity.com), a professional services company which focuses on improving enterprise security. He is one of about 100 people in the world who holds the Microsoft Certified Master Directory Services (MCM) Active Directory certification, is a Microsoft MVP, and has presented on Active Directory, Azure AD, & Microsoft Cloud attack and defense at security conferences such as Black Hat, BSides, DEF CON, and DerbyCon.

Sponsor Presenter:

Maor Bin

CEO and Co-Founder

Adaptive Shield

A former cybersecurity intelligence officer in the IDF, Maor has over 16 yrs in cybersecurity leadership. In his career, he led SaaS Threat Detection Research at Proofpoint and won the operational excellence award during his IDI service.

Maor got his BSc in Computer Science and is CEO and co-founder of Adaptive Shield, the SaaS Security Posture Management solution built to help security teams gain control over their SaaS app security and prevent vulnerabilities that could lead to leak or breach.

Sustaining Partners