The Hybrid Heist: Moving from Cloud to On-Prem Like an Attacker banner image
Webinar

The Hybrid Heist: Moving from Cloud to On-Prem Like an Attacker

03 April 2025 | 11:00 am
45 mins
Are your systems robust enough to resist and deter attackers?

Cloud environments are an easy target for attackers, especially if you’ve made yourself a prime target with the common misconfigurations we’ll be looking at in this webinar. By understanding the techniques attackers use to infiltrate cloud systems and pivot to on-prem networks, you can avoid these misconfigurations and better secure your cloud environments. 

In this webinar Luiz Simpson, Head of Red Team, and Ben Shaw, Red Team Specialist, will discuss the tactics used by attackers to infiltrate cloud systems and share the best techniques to detect, prevent, and respond to these attacks. This webinar will also include a demonstration on how attackers bypass Multi-Factor Authentication (MFA) and Conditional Access controls. 

Webinar Highlights: 

  • Learn how attackers compromise cloud environments and laterally move to on-prem 

  • Understand the misconfigurations which real world attackers commonly leverage 

  • See a demonstration of the latest methods used by attackers, including how they bypass MFA and conditional access 

  • Understand how access control and permissions can be detected and abused  

  • Equip yourself with the knowledge to detect and prevent against these sophisticated attacks 

Speakers

Luiz Simpson

Luiz Simpson

Head of Red Team

Bridewell

Ben Shaw

Ben Shaw

Red Team Specialist

Register to Watch