MIT Sloan AI Adoption: Build a Playbook That Drives Real Business ROI
Build the Finance Skills That Lead to Promotions — Not Just Certificates
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Explore a comprehensive 32-minute cybersecurity webinar that examines OAuth application security threats through real-world analysis. Learn to differentiate between legitimate and malicious OAuth applications as Red Canary's threat hunting experts Alex and Harrison guide you through concerning trends in AI email applications that request excessive permissions. Discover how OAuth tokens can remain active even after password changes through a detailed case study, and understand the critical importance of auditing application permissions. Master techniques for identifying and removing potentially malicious apps while learning to trust established vendors to mitigate OAuth-related security risks. Gain practical insights into Azure OAuth fundamentals, examine specific abuse patterns, and develop skills for conducting thorough OAuth application audits to protect your organization from sophisticated cyber attacks.
Syllabus
00:00 - 00:49 Intro
00:50 - 02:30 Welcome to Red Canary Office Hours
02:31 - 04:03 What is Azure OAuth?
04:04 - 09:43 Case Study
09:44 - 11:04 How OAuth's are abused
11:05 - 30:29 Auditing OAuth Apps
30:30 - 32:25 See you next time!
Taught by
Red Canary