BEGIN:VCALENDAR
VERSION:2.0
X-WR-CALNAME:BrightTALK Event
PRODID:-//BrightTALK//NONSGML BrightTALK Event Calendar//EN
CALSCALE:GREGORIAN
METHOD:REQUEST
BEGIN:VEVENT
UID:https://www.brighttalk.com/webcast/18851/667404
DTSTAMP:20260426T182558Z
ORGANIZER:MAILTO:noreply@brighttalk.com
LOCATION:BrightTALK
URL:https://www.brighttalk.com/webcast/18851/667404?utm_campaign=commu
 nication_reminder_24hr_registrants&utm_medium=calendar&utm_source=brig
 httalk-transact
DTSTART:20260513T090000Z
DTEND:20260513T091530Z
SUMMARY:Live webcast: One Click to Compromise: OAuth Consent Phishing 
 Attacks
DESCRIPTION:Click here to attend: https://www.brighttalk.com/webcast/1
 8851/667404?utm_campaign=communication_reminder_24hr_registrants&utm_m
 edium=calendar&utm_source=brighttalk-transact\n\nPresenter: Amanda Won
 g, Product Marketing Manager\n\nOAuth consent phishing is rapidly emer
 ging as a stealthy, high-impact attack vector that bypasses traditiona
 l defenses. In this session, Amanda Wong breaks down how attackers exp
 loit trusted authorization flows to gain persistent, API-based access 
 to sensitive data—without triggering MFA or login alerts. \n\nThrough 
 real-world examples, including malicious Microsoft Teams invites and e
 -signature redirect abuse, you’ll see how these attacks evade detectio
 n and persist even after credential resets. The webinar also highlight
 s practical mitigation strategies and demonstrates how Abnormal Securi
 ty helps organizations proactively detect, remediate, and automate res
 ponse to OAuth-based threats at scale.\n\nJoin our webinar to learn:\n
 \n- How OAuth consent phishing bypasses MFA and maintains persistent a
 ccess\n- Real attack scenarios and why they evade traditional detectio
 n\n- Proven strategies to detect, remediate, and prevent OAuth-based t
 hreats\n\nRegister now to learn how to stop OAuth-based attacks before
  they spread!
SEQUENCE:1778575931
END:VEVENT
END:VCALENDAR
