BEGIN:VCALENDAR
VERSION:2.0
X-WR-CALNAME:BrightTALK Event
PRODID:-//BrightTALK//NONSGML BrightTALK Event Calendar//EN
CALSCALE:GREGORIAN
METHOD:REQUEST
BEGIN:VEVENT
UID:https://www.quest.com/webcast-hub?commid=667459
DTSTAMP:20260506T151001Z
ORGANIZER:MAILTO:noreply@brighttalk.com
LOCATION:BrightTALK
URL:https://www.quest.com/webcast-hub?commid=667459&utm_campaign=commu
 nication_rescheduled&utm_medium=calendar&utm_source=brighttalk-transac
 t
DTSTART:20260519T150000Z
DTEND:20260519T154500Z
SUMMARY:Live webcast: Beyond Detection - Episode 1: Understanding Iden
 tity Risk Before It Becomes Compromise
DESCRIPTION:Click here to attend: https://www.quest.com/webcast-hub?co
 mmid=667459&utm_campaign=communication_rescheduled&utm_medium=calendar
 &utm_source=brighttalk-transact\n\nPresenter: Daniel Eliot, NIST and B
 ryan Patton, Quest Software\n\nIdentity has become the primary target 
 for modern cyberattacks, making clear visibility into identity risk mo
 re critical than ever. Across Active Directory and Entra ID, years of 
 organic growth, misconfigurations, and hidden privilege create a compl
 ex web of access that’s difficult to see and even harder to secure.\n\
 nAs the first step in building identity resilience, organizations must
  understand where risk exists before it’s exploited. Attackers take ad
 vantage of limited visibility, leveraging identity relationships, Tier
  0 exposure, and attack paths to move undetected and gain control with
 out triggering traditional defenses. \n\nJoin us as we break down how 
 to uncover and understand your identity attack surface, including:\n• 
 How to map your identity infrastructure across AD and Entra\n• Where h
 idden privilege and Tier 0 risks typically exist\n• How attackers disc
 over and exploit identity attack paths
SEQUENCE:1778080208
END:VEVENT
END:VCALENDAR
