Upcoming Product Demo
Duration: 00:45

Under Attack: Simulating, Surviving and Restoring from an Identity Threat

Register to watch

By registering, you are agreeing to have your personal information managed in accordance with the terms of Veeam's Privacy Notice.
By registering, you are agreeing to receive information about Veeam products and events and to have your personal information managed in accordance with the terms of Veeam's Privacy Notice.
Verify your email to continue your product download
We've sent a verification code to:
  • Incorrect verification code. Please try again.
An email with a verification code was just sent to
Didn't receive the code? Click to resend in sec
Didn't receive the code? Click to resend

ty icon

Thank you!

We have received your request and our team will reach out to you shortly.

OK

error icon

Oops! Something went wrong.

Please, try again later.

Session details:
Stream starts in:
days
:
hours
:
min
On Air

Attackers are getting smarter. Instead of breaking in, they walk through the front door, wear your badge, and use your credentials.

Join a Veeam Field CTO as they simulate a modern identity attack, demonstrate how attackers move laterally, and trigger disruptions across systems like Microsoft 365, Entra ID, Salesforce, and Azure. Discover how emerging threats, like the rapid adoption of Copilot AI Agents, can accelerate impact and lead to the deletion of critical business data, often without immediate detection.

In this session, you will:

  • Witness the real-world impact of an identity attack
  • Learn how to restore trust in identities and recover affected SaaS and cloud data
  • Discover strategies to reduce business disruption and bolster defenses

Speaker

Ben Young
Ben Young
Field CTO APJ, Veeam Software
Specialising in the integration & automation of a broad range of cloud & virtualisation technologies including Veeam, VMware, Fortinet, Dell EMC into multi-tenant web applications.
Show less Show more