In recent years, some of the most damaging cyberattacks in Europe share a common thread – identity. As traditional defences strengthen, attackers have shifted tactics, moving away from malware and exploits toward abusing legitimate credentials, permissions, and trust relationships within enterprise environments.
This session considers how attackers use identities to navigate industry-standard defences. We’ll explore the anatomy of an identity-based attack – from initial access through to organisational-wide takeover – and highlight recurring patterns seen across European enterprises.
Today’s breaches aren’t the result of poor security but of unseen complexity. Hidden identity attack paths buried deep in Active Directory and Entra ID provide adversaries with millions of routes to critical systems.
We’ll conclude with a strategy to move from reactive defence to proactive identity risk management. By continuously mapping and removing identity attack paths, organisations can eliminate the bridges adversaries depend on.
As financial services firms continue to digitise, their exposure now stretches far beyond the traditional perimeter. From the dark web to domain impersonation and unpatched vulnerabilities, risks can emerge anywhere your brand or data appear online.
This session explores how organisations can harness diverse intelligence sources – including the dark web – to uncover hidden risks and strengthen their digital resilience. Through real-world examples, we’ll show how Digital Risk Protection (DRP) turns threat data into clear, actionable insight that helps financial institutions stay ahead of attackers
The financial services market has driven major security improvements through frameworks such as CBEST and TIBER, with its behaviour helping raise standards across other sectors. But does confidence still outpace reality? This session explores the blind spots that remain, including fragile supply chains, hidden attack paths, and vendor risks, while challenging what resilience and true assurance mean in complex, real-world environments
• Overview of key cybersecurity regulations
• Managing compliance across jurisdictions
• How to be prepared for evolving data privacy standards?