Radiant Logic has launched a three-part webinar series titled “Through the Eyes of the Adversary: How Identity Is Exploited as the Primary Attack Surface,” featuring former hackers and offensive security experts to reveal how modern cyberattacks exploit identity as the main entry point and propagation vector.
Radiant Logic, a pioneer in Identity Data Fabric and leader in Identity Security Posture Management (ISPM), announced the launch of “Through the Eyes of the Adversary,” a three-part webinar series designed to provide defenders with an adversary’s viewpoint on how identity has become the primary attack surface in modern breaches.
As human, non-human, and AI-driven identities multiply across hybrid and multi-cloud infrastructures, attackers increasingly target fragmented identity data, over-privileged accounts, misconfigurations, and weak trust relationships to gain initial access, move laterally, establish persistence, and escalate privileges—often evading conventional security controls.
This series brings together former hackers, malware researchers, and offensive security practitioners to dissect real-world attack techniques and share actionable strategies for closing identity-related gaps.
February 24, 2026 at 11:00 a.m. ET Featuring Master OccupyTheWeb
This opening session explores how adversaries assess identity relationships well before engaging critical assets. Attendees will learn how attackers map users, service accounts, and trust assumptions to discover hidden attack paths across IT and OT environments, correlate human and non-human identities, and exploit broken trust assumptions that keep attacks stealthy. The discussion will cover upstream conditions attackers prioritize—such as over-privileged access, stale credentials, unmanaged service accounts, and blind system trusts—along with defensive measures like enforcing least privilege, implementing just-in-time access, and prioritizing monitoring of high-value identities.
March 31, 2026 at 11:00 a.m. ET Featuring Marcus Hutchins
Malware researcher and incident responder Marcus Hutchins connects identity abuse patterns to actual ransomware, malware, and data breach incidents. Drawing from observed attack timelines, the session illustrates how credential theft, token abuse, session hijacking, and misconfigured federation enable rapid attacker progression and amplification of impact, while highlighting critical identity signals that responders need earlier in the kill chain.
April 28, 2026 at 11:00 a.m. ET Featuring Freaky Clown
Physical and cyber security expert Freaky Clown examines the convergence of digital and physical identity exploitation. The session covers techniques such as social engineering, badge cloning, over-trusted VPN access, and forgotten contractor identities, demonstrating how minor oversights compound into full compromise. Practical hardening steps for hybrid enterprises will be outlined to strengthen identity controls across environments.
“This series is about shifting perspective,” said Anders Askasen, Senior Vice President of Marketing, Radiant Logic. “When defenders understand how attackers actually see identity inside an organization, they can start closing the gaps that enable modern breaches. Identity can no longer be treated as just an access layer. It has become the primary control plane.”
About Radiant Logic
Radiant Logic is the pioneer of the Identity Data Fabric and a leader in Identity Security Posture Management (ISPM). We help complex enterprises reduce identity risk and strengthen resilience by turning fragmented identity data into a unified, observable, and actionable foundation for security. RadiantOne Identity Data Cloud is a centralized platform that unifies identity data across legacy systems, cloud platforms, and non-human identities, observes risk in real-time with AI-driven analytics, and acts through built-in remediation with full accountability. The result is continuous visibility, contextual intelligence, and faster risk reduction across the IAM ecosystem.