Given its widespread use, Microsoft 365 has been a prime target for cybercriminals and nation-state actors seeking to deploy malware, ransomware, and various malicious attacks. Despite Microsoft's continuous efforts to enhance security, hackers persist in discovering novel exploitation methods. Presently, we're witnessing a migration of these attacks into the cloud environment. Discover the precise methods employed by attackers in targeting Microsoft 365, and gain valuable insights into the proactive measures your organization can adopt to fortify its defenses.
Mustafa Toroman is a technology professional and the Chief Technology Officer (CTO) at run.events, a company that provides a platform for organizing and managing events. He has over 20 years of experience in the IT industry and has held various technical and leadership positions in companies around the world. Toroman has a deep understanding of software development, cloud computing, and IT infrastructure management. He has expertise in building scalable and resilient systems that can handle large amounts of data and traffic. He is also a strong advocate for DevOps and believes in continuous improvement and learning. Toroman is a Microsoft Azure MVP (Most Valuable Professional), a frequent speaker at technology conferences and events, and also and a community leader organizing meetups and events. He is also a published author and has written several books on Microsoft technologies and cloud computing.