The biggest takeaway from the SolarWinds attacks shouldn’t be that it may have employed over
1000 hackers, or that its full implications won’t be known for many months - it is that this
targeted compromise of Microsoft Office 365 is relevant to so many organizations.
What the SolarWinds campaign proved is that any organization exposed to an Office 365
account compromise could experience the same lateral escalation that resulted in this
devastating incident - driven by trust relationships existing across connected clouds.
How do security leaders and operational practitioners respond to this troubling event?
Join us for an informational “how-to” best practices webinar to discuss tactics for securing Office
365 and connected cloud applications from attacks. We’ll outline key topics including:
-Adapting Office 365 access controls based on user, data and device context
-Logging cross-cloud incidents to investigate problematic events
-Using analytics to Identify lateral threats across Office 365 and other clouds
-Amplifying native Office 365 data controls with DLP, E-DRM and encryption
We’ll also touch on elements of the MITRE ATT@CK Cloud Matrix that can be used to help
frame defenses in depth.