Lateral Movement to Credential Theft: How Endpoint and Identities are Interconnected
Featuring
About This Webinar
The Huntress SOC has seen all kinds of real-world incidents: a hacker breaks into a logistics company via exposed RDP; a physician's stolen credentials are used to log in from a shady workstation and snake through a network; an attacker sets up sneaky inbox rules to maintain access from a phished user.
Are these endpoint or identity attacks? Or are they both?
Untangling endpoint attacks from identity breaches isn't always simple: as attackers pivot from targeting devices to exploiting the identities driving your business, understanding how the two are interconnected is non-negotiable.
-
Host Scott Bekker Webinar Moderator Future B2B
-
Featuring James Mason Product Marketing Manager Huntress
-
Featuring Erin Meyers Principal Product Marketing Manager Huntress
What You'll Learn
- The endpoint and identity attack surfaces: what they are, what the unique risks are for both, and why they matter.
- Real-world tradecraft used to exploit endpoints and identities.
- Why pairing endpoint and identity protection is critical for a rock-solid security posture.