Webinar | August thirteenth & 14th 2025
Identification assaults have modified — have your IR playbooks?
How identification assaults have developed from the times of AD assaults.
What investigation and response used to appear like, and the challenges that trendy identification brings to conventional instruments and processes.
Step-by-step walkthrough of utilizing the Push platform to research and reply to trendy identification assault eventualities, from analyzing the timeline of a browser-based phishing assault, to investigating the blast radius of a compromised identification.
Automations and use-cases that Push clients have constructed utilizing browser telemetry to detect and reply to assaults and remediate identification vulnerabilities.
Josh GideonProduct Staff



