
Daniel Goltz, Principal Software Engineering Group Manager at Microsoft
Dr. Nestori Syynimaa, Principal Identity Security Researcher @ Microsoft, @DrAzureAD
Daniel is a Principal Software Engineering Group Manager at Microsoft, leading a large team of 70 engineers in the Defender for Cloud Apps product, with a focus on post-breach security. He brings a product-oriented mindset, consistently looking at challenges from the customer’s perspective. His journey includes roles as a team lead, tech lead, and individual contributor at Microsoft, as well as serving as CTO of an early-stage smart transportation startup and experience in IDF's elite technology unit 8200. Drawing from his diverse background, Daniel is committed to maximizing engineering impact through strategic leadership, modeling, coaching, and caring for his team to foster a culture of growth and resilience.
Dr Nestori Syynimaa is a Principal Identity Security Researcher at Microsoft Threat Intelligence Center He has over a decade of experience with the security of Microsoft cloud services and is known as the creator of the AADInternals toolkit. Before joining Microsoft in early 2024, Dr Syynimaa worked as a researcher, CIO, consultant, trainer, and university lecturer for over 20 years.
Dr Syynimaa has spoken in many international scientific and professional conferences, including IEEE TrustCom, TROOPERS, BSides, Black Hat USA, Europe, and Asia, Def Con, and RSA Conference.
talks & Q&A
conference | sep 18

Defending Against the Evolving OAuth Attack Landscape
Description
OAuth has become a cornerstone of modern authentication, enabling seamless integration between applications and services. However, as organizations increasingly rely on OAuth for their SaaS environments, attackers have evolved their techniques to exploit its vulnerabilities.
In this demo packed session, we will explore the latest trends and threats in the OAuth attack landscape, uncovering how attackers conduct token-theft attacks, exploit misconfigurations, abuse app permissions, and target non-human identities. Attendees will gain an understanding of how these attacks unfold, their potential impact on an organization's security posture, and how to defend against them.