Token Theft Deep Dive Part 2: Prevention Techniques
Автор: T-Minus365
Загружено: 2025-06-16
Просмотров: 2524
In this episode, we dive into the Token Theft Playbook: Proactive Protections to unpack six Conditional Access policies that stop AiTM and token-replay attacks in their tracks. If you’re responsible for securing a Microsoft 365 environment—whether as an IT pro or an MSP—this deep-dive is for you.
🚀 What You’ll Learn
✅ What token theft really is and why it’s a rising threat
✅ How “Require a Managed Device” blocks AiTM harvesting
✅ Why “Require a Compliant Device” extends protection to BYOD
✅ How Phishing-Resistant MFA (FIDO2, passkeys) thwarts credential theft
✅ The power of restricting sign-ins to Trusted IP locations
✅ Why Device-Bound Tokens safeguard desktop apps
✅ How Global Secure Access (Microsoft’s SASE) completes your defense
🔒 Why Watch?
Token theft attacks can slip past traditional MFA and kill-chain defenses. By layering these Conditional Access controls—ideally rolled out in report-only mode first—you build a proactive shield that stops attackers before they breach your perimeter.
Token Theft Webinar: https://learn.cloudcapsule.io/cloudca...
🎧 Full Blog here:
https://tminus365.com/token-theft-pla...
Table of Contents:
00:00 – Intro
02:25 – Simulating Token Theft
04:33 – Require managed device
09:53 – Require Compliant device
13:55 – Require Phishing-Resistant MFA
17:42 – Require Trusted Location
20:35 – Require Device-Bound Tokens
22:44 – Require Global Secure Access
#Microsoft365 #ConditionalAccess #AiTM #TokenTheft #ZeroTrust #Cybersecurity #MSP #Infosec #TMinus365 #CloudSecurity #M365Security
Доступные форматы для скачивания:
Скачать видео mp4
-
Информация по загрузке: