Special Webinar Event Lateral Movement to Credential Theft: How Endpoint and Identities are Interconnected

Featuring

  • Huntress
WIN A $250 Amazon Gift Card

REGISTER NOW & YOU COULD WIN A $250 Amazon.com Gift Card!

Must be in live attendance to qualify. Duplicate or fraudulent entries will be disqualified automatically.

About This Webinar

A hacker waltzes into a logistics company via an exposed RDP. A physician's stolen credentials end up in the hands of a threat actor who logs in from a shady workstation and snakes through the network. An attacker sets up sneaky inbox rules to maintain access from a phished user. These are all real-world threats our SOC has seen.
So, are these endpoint or identity attacks? Or both?

Untangling endpoint attacks from identity breaches isn't always straightforward. But here's the deal: as attackers pivot from targeting devices to exploiting the very identities driving your business, understanding how the two are interconnected is non-negotiable.

  1. Scott Bekker

    Host Scott Bekker Webinar Moderator, Future B2B

  2. Seth Geftic

    Featuring Seth Geftic VP of Product Marketing, Huntress

  3. Erin Meyers

    Featuring Erin Meyers Principal Product Marketer, Huntress

Knowledge is power. That's why we're inviting you to join this Huntress webinar, where they break it all down:

  1. The endpoint and identity attack surfaces--what they are, what the unique risks are for both, and why they matter.
  2. Real-world tradecraft used to exploit endpoints and identities.
  3. Why pairing endpoint and identity protection is critical for a rock-solid security posture.