BEGIN:VCALENDAR
VERSION:2.0
X-WR-CALNAME:BrightTALK Event
PRODID:-//BrightTALK//NONSGML BrightTALK Event Calendar//EN
CALSCALE:GREGORIAN
METHOD:REQUEST
BEGIN:VEVENT
UID:https://www.brighttalk.com/webcast/18851/667399
DTSTAMP:20260426T182031Z
ORGANIZER:MAILTO:noreply@brighttalk.com
LOCATION:BrightTALK
URL:https://www.brighttalk.com/webcast/18851/667399?utm_campaign=commu
 nication_reminder_24hr_registrants&utm_medium=calendar&utm_source=brig
 httalk-transact
DTSTART:20260506T020000Z
DTEND:20260506T022328Z
SUMMARY:Live webcast: Inside the Takeover: How Abnormal AI Detected an
 d Stopped a Real Account Compromise
DESCRIPTION:Click here to attend: https://www.brighttalk.com/webcast/1
 8851/667399?utm_campaign=communication_reminder_24hr_registrants&utm_m
 edium=calendar&utm_source=brighttalk-transact\n\nPresenter: David van 
 Schravendijk, Sr. Product Marketing Manager, Abnormal AI,\n\nAccount t
 akeover (ATO) attacks have evolved—no longer relying on brute force or
  malware, but on valid credentials and subtle, post-login manipulation
 . Join David van Schravendijk, Sr. Product Marketing Manager at Abnorm
 al AI, for a deep dive into how modern attackers gain persistence, eva
 de detection, and quietly prepare for financial fraud or lateral phish
 ing. Through real-world examples, including adaptive ADFS phishing and
  coordinated multi-account compromise, you’ll see why traditional tool
 s miss these threats. Learn how Abnormal correlates behavioral signals
 , authentication telemetry, and attacker infrastructure to uncover hid
 den ATO activity and automate response before damage is done.\n\nJoin 
 our session and learn:\n\n- How modern ATO attacks use valid credentia
 ls to evade detection\n- Why isolated signals fail—and how correlation
  reveals hidden threats\n- How automated detection and response stop A
 TO before escalation\n\nRegister now to stay ahead of today’s most adv
 anced account takeover attacks.
SEQUENCE:1777945578
END:VEVENT
END:VCALENDAR
