History & Future of Credentials Theft
The most common attack vector used by malicious actors to infiltrate and compromise organizations is the compromise of privileged credentials. The most significant breaches in the past 15 years are a solid proof for it.
In the presentation below I describe how hackers are using those credentials and what attack vectors they will choose to take in the near future, as organizations adopt cloud computing and DevOps automation tools.
Media coverage of the insights discussed in the History and future of Credentials Theft: