Skip navigation

How Attackers Steal Credentials to Gain Stealthy Access to Your Organization

In this on-demand webinar, you will learn:

  • The break down of an identity attack piece by piece
  • Actionable insights to defend your organization against cyber attacks

You’ve no doubt heard the phrase, “Attackers don’t hack anyone these days. They log on.” By obtaining (or stealing) valid user account details, an attacker can gain access to a system, remain hidden, and then elevate their privileges to “log in” to more areas of the network.

As a result of the level of access stolen credentials can provide, the use of valid accounts is prevalent across the threat landscape. Not only is it the second most common MITRE ATT&CK tactic, but the rise of MFA and an increase in basic phishing awareness means adversaries have gotten more creative. Often, this ends with the user being targeted for possible manipulation as part of an “insider attack.”

But don't worry, at Duo, we've got you. To illustrate ways in which security practitioners can help defend against the techniques employed in credential stealing attacks, this webinar will break down an identity attack piece by piece. There will also be a discussion of methods and mechanisms to prevent or detect these techniques to stop breaches or limit their impact.

Presenter Info

William Largent, Security Threat Researcher, Cisco Talos

William Largent is a threat researcher for Cisco Talos, with over 23 years of experience in information security. William previously worked for the Cisco IPS Signature team where he researched vulnerabilities and wrote signatures for Cisco security products. Previous to the Cisco IPS Signature team, William worked for Cisco Remote Managed Services, where he provided vendor-agnostic managed security services. William has three awesome kids and the world’s most patient wife.

Hazel Burton, Content Development Manager, Cisco Talos

Hazel Burton is part of Cisco Talos' Strategic Communications team and has been in the cybersecurity industry for over 10 years. She creates materials and content to keep Cisco customers informed of the latest threats, and produced a documentary on Talos' work in Ukraine to protect critical infrastructure from cyber attacks.

Ted Kietzman
Ted Kietzman, Product Marketing Manager, Cisco Duo

Ted researches trends in the cybersecurity industry with a focus on identity and access management. He has particular interest in the adoption of passwordless authentication and identity threat detection and response. He has experience working for both large cyber companies and small startups. He has an MBA from Emory University and a Bachelor's Degree in Physics from Bowdoin College.