Loading Events

« All Events

Nomasis webinar: They don’t hack in. They log in

April 16 @ 10 h 15 - 10 h 45
identity-based attacks and vishing explained in cybersecurity webinar

Identity based attacks and vishing are among the most serious threats in mondern IT Security.  Instead of exploiting technical vulnerabilities, attackers now focus on stolen identities and social engineering. As a result, they gain legitimate access to systems without triggering traditional defenses.

In this webinar, hosted in collaboration with Lookout, you will learn how identity-based attacks and vishing work in practice. Moreover, you will understand why attackers no longer hack in but log in—and how organisations can effectively protect the human and identity layer.

Identity abuse in IT security: What can you expect from the webinar?

In this webinar, we examine current attack scenarios across the human and identity-based attack surface. You will gain a thorough understanding of how modern login attacks are prepared, executed and successfully exploited. In addition, we show how these attacks impact security, infrastructure and operations teams.

You will learn:

  • Vishing as a gateway for identity attacks: You will gain in-depth insight into current vishing methods and learn how attackers use AI, deepfakes and targeted conversation techniques to persuade employees to disclose access data, MFA codes or internal information.
  • The human layer in modern IT environments: We analyse why humans currently represent the largest attack surface and how hybrid working models, cloud identities and mobile devices further increase the complexity for security and operations teams.
  • Practical case studies from real environments: Using specific incident scenarios, Lookout shows how login-based attacks work, which security controls are bypassed and why a single successful call is often enough to gain access to critical systems.
  • Strategies for strengthening the human security line: You will learn how technical controls, awareness measures and modern mobile security approaches can be combined effectively to detect identity misuse at an early stage and reduce risk in the long term.

Your benefits:

  • Protection at the human and identity level
  • Comprehensive mobile threat defence
  • Transparency about real risks
  • Seamless integration into existing IT architectures
  • Reduction of operational effort

Protect your business – quickly, effectively and future-proof.

Why you should participate

When attackers work with valid access data, traditional perimeter and network protection mechanisms fall short. This webinar shows you how current threats are developing at the identity and human level and which measures are crucial today.

Registration

"*" indicates required fields

Name*

Stay informed via our news portal or follow us on LinkedIn for updates.

Details

  • Date: April 16
  • Time:
    10 h 15 - 10 h 45
  • Event Category: