Special Webinar Event Lateral Movement to Credential Theft: How Endpoint and Identities are Interconnected
Featuring

REGISTER NOW & YOU COULD WIN A $250 Amazon.com Gift Card!
Must be in live attendance to qualify. Duplicate or fraudulent entries will be disqualified automatically.
About This Webinar
A hacker waltzes into a logistics company via an exposed RDP. A physician's stolen credentials end up in the hands of a threat actor who logs in from a shady workstation and snakes through the network. An attacker sets up sneaky inbox rules to maintain access from a phished user. These are all real-world threats our SOC has seen.
So, are these endpoint or identity attacks? Or both?
Untangling endpoint attacks from identity breaches isn't always straightforward. But here's the deal: as attackers pivot from targeting devices to exploiting the very identities driving your business, understanding how the two are interconnected is non-negotiable.
-
Host Scott Bekker Webinar Moderator, Future B2B
-
Featuring Seth Geftic VP of Product Marketing, Huntress
-
Featuring Erin Meyers Principal Product Marketer, Huntress
Knowledge is power. That's why we're inviting you to join this Huntress webinar, where they break it all down:
- The endpoint and identity attack surfaces--what they are, what the unique risks are for both, and why they matter.
- Real-world tradecraft used to exploit endpoints and identities.
- Why pairing endpoint and identity protection is critical for a rock-solid security posture.