BEGIN:VCALENDAR
VERSION:2.0
X-WR-CALNAME:BrightTALK Event
PRODID:-//BrightTALK//NONSGML BrightTALK Event Calendar//EN
CALSCALE:GREGORIAN
METHOD:REQUEST
BEGIN:VEVENT
UID:https://www.brighttalk.com/webcast/18851/667399
DTSTAMP:20260426T182031Z
ORGANIZER:MAILTO:noreply@brighttalk.com
LOCATION:BrightTALK
URL:https://www.brighttalk.com/webcast/18851/667399?utm_campaign=commu
 nication_reminder_starting_now_registrants&utm_medium=calendar&utm_sou
 rce=brighttalk-transact
DTSTART:20260506T020000Z
DTEND:20260506T022328Z
SUMMARY:Live webcast: Inside the Takeover: How Abnormal AI Detected an
 d Stopped a Real Account Compromise
DESCRIPTION:Click here to attend: https://www.brighttalk.com/webcast/1
 8851/667399?utm_campaign=communication_reminder_starting_now_registran
 ts&utm_medium=calendar&utm_source=brighttalk-transact\n\nPresenter: Da
 vid van Schravendijk, Sr. Product Marketing Manager, Abnormal AI,\n\nA
 ccount takeover (ATO) attacks have evolved—no longer relying on brute 
 force or malware, but on valid credentials and subtle, post-login mani
 pulation. Join David van Schravendijk, Sr. Product Marketing Manager a
 t Abnormal AI, for a deep dive into how modern attackers gain persiste
 nce, evade detection, and quietly prepare for financial fraud or later
 al phishing. Through real-world examples, including adaptive ADFS phis
 hing and coordinated multi-account compromise, you’ll see why traditio
 nal tools miss these threats. Learn how Abnormal correlates behavioral
  signals, authentication telemetry, and attacker infrastructure to unc
 over hidden ATO activity and automate response before damage is done.\
 n\nJoin our session and learn:\n\n- How modern ATO attacks use valid c
 redentials to evade detection\n- Why isolated signals fail—and how cor
 relation reveals hidden threats\n- How automated detection and respons
 e stop ATO before escalation\n\nRegister now to stay ahead of today’s 
 most advanced account takeover attacks.
SEQUENCE:1778031967
END:VEVENT
END:VCALENDAR
