This resource is no longer available

APT29 and other threat actors have used several methodologies to move laterally from on-premises networks to the cloud, specifically Microsoft 365.
This white paper is designed to help organizations understand the attack techniques employed by APT29, how to proactively harden their environments against them, and how to remediate environments where similar techniques have been observed.
Download now to learn more.