This document outlines an advanced targeted attack and then discusses identity and access management (IAM) best practices to prevent such attacks. It begins with an example "Golden Ticket" attack demonstration. Then, it describes the typical phases of an advanced attack including external reconnaissance, internal reconnaissance, lateral movement, and compromise of privileged accounts. Finally, it discusses IAM best practices such as implementing least privilege, managing application access, using network segmentation, securing credentials, implementing credential boundaries, and monitoring privileged access. The presentation aims to demonstrate advanced attack techniques in order to highlight the importance of strong IAM controls.