Home
News
Tech Grid
Interviews
Anecdotes
Think Stack
Press Releases
Articles
  • Identity & Access Management

Radiant Logic Launches Adversary Identity Webinar Series


Radiant Logic Launches Adversary Identity Webinar Series
  • by: Source Logo
  • |
  • February 13, 2026

Radiant Logic has launched a three-part webinar series titled “Through the Eyes of the Adversary: How Identity Is Exploited as the Primary Attack Surface,” featuring former hackers and offensive security experts to reveal how modern cyberattacks exploit identity as the main entry point and propagation vector.

Quick Intel

  • Radiant Logic introduces a three-part webinar series examining identity exploitation from an adversary perspective.
  • Sessions feature experts OccupyTheWeb, Marcus Hutchins, and Freaky Clown sharing real-world insights on identity-based attacks.
  • Topics cover identity mapping, credential abuse, token hijacking, federation misconfigurations, and blended physical-digital attacks.
  • Focus on fragmented identity data, excessive privileges, stale credentials, and broken trust relationships in hybrid/multi-cloud environments.
  • Series highlights practical defenses including least privilege, just-in-time access, monitoring high-value identities, and unified identity visibility.
  • Webinars scheduled for February 24, March 31, and April 28, 2026, at 11:00 a.m. ET.

Radiant Logic, a pioneer in Identity Data Fabric and leader in Identity Security Posture Management (ISPM), announced the launch of “Through the Eyes of the Adversary,” a three-part webinar series designed to provide defenders with an adversary’s viewpoint on how identity has become the primary attack surface in modern breaches.

As human, non-human, and AI-driven identities multiply across hybrid and multi-cloud infrastructures, attackers increasingly target fragmented identity data, over-privileged accounts, misconfigurations, and weak trust relationships to gain initial access, move laterally, establish persistence, and escalate privileges—often evading conventional security controls.

This series brings together former hackers, malware researchers, and offensive security practitioners to dissect real-world attack techniques and share actionable strategies for closing identity-related gaps.

Session 1: Through the Eyes of the Adversary: Why Identity Is the First Battlefield

February 24, 2026 at 11:00 a.m. ET Featuring Master OccupyTheWeb

This opening session explores how adversaries assess identity relationships well before engaging critical assets. Attendees will learn how attackers map users, service accounts, and trust assumptions to discover hidden attack paths across IT and OT environments, correlate human and non-human identities, and exploit broken trust assumptions that keep attacks stealthy. The discussion will cover upstream conditions attackers prioritize—such as over-privileged access, stale credentials, unmanaged service accounts, and blind system trusts—along with defensive measures like enforcing least privilege, implementing just-in-time access, and prioritizing monitoring of high-value identities.

Session 2: Through the Eyes of the Adversary, Part 2: Identity Abuse in Real-World Breaches

March 31, 2026 at 11:00 a.m. ET Featuring Marcus Hutchins

Malware researcher and incident responder Marcus Hutchins connects identity abuse patterns to actual ransomware, malware, and data breach incidents. Drawing from observed attack timelines, the session illustrates how credential theft, token abuse, session hijacking, and misconfigured federation enable rapid attacker progression and amplification of impact, while highlighting critical identity signals that responders need earlier in the kill chain.

Session 3: Through the Eyes of the Adversary, Part 3: Breaking and Defending Identity in Hybrid Enterprises

April 28, 2026 at 11:00 a.m. ET Featuring Freaky Clown

Physical and cyber security expert Freaky Clown examines the convergence of digital and physical identity exploitation. The session covers techniques such as social engineering, badge cloning, over-trusted VPN access, and forgotten contractor identities, demonstrating how minor oversights compound into full compromise. Practical hardening steps for hybrid enterprises will be outlined to strengthen identity controls across environments.

“This series is about shifting perspective,” said Anders Askasen, Senior Vice President of Marketing, Radiant Logic. “When defenders understand how attackers actually see identity inside an organization, they can start closing the gaps that enable modern breaches. Identity can no longer be treated as just an access layer. It has become the primary control plane.”

About Radiant Logic 

Radiant Logic is the pioneer of the Identity Data Fabric and a leader in Identity Security Posture Management (ISPM). We help complex enterprises reduce identity risk and strengthen resilience by turning fragmented identity data into a unified, observable, and actionable foundation for security. RadiantOne Identity Data Cloud is a centralized platform that unifies identity data across legacy systems, cloud platforms, and non-human identities, observes risk in real-time with AI-driven analytics, and acts through built-in remediation with full accountability. The result is continuous visibility, contextual intelligence, and faster risk reduction across the IAM ecosystem.

  • Identity SecurityCybersecurityIdentity Threat
News Disclaimer
  • Share