Thursday, October 23 · 1:00 PM ET
North Korean (DPRK) operators pose as remote workers to reach sensitive data. You can surface these impostors by reviewing Zoom and Slack access logs and enriching suspicious IPs.
What you’ll learn in the session
- Demonstrate how to pull usage data from Zoom and Slack.
- Map IPs using Spur data for additional context.
- Identify anonymous access that should raise alarms.
Why attend
- Catch proxy-driven access (e.g., Astrill VPN, residential proxies) early.
- Strengthen SaaS security workflows with IP enrichment.
- Stop fraudulent “employees” before sensitive data is compromised.
Speaker
Riley Kilmer, Co-Founder of Spur
