Lateral Movement to Credential Theft: How Endpoint and Identities are Interconnected

Featuring

  • Huntress

About This Webinar

The Huntress SOC has seen all kinds of real-world incidents: a hacker breaks into a logistics company via exposed RDP; a physician's stolen credentials are used to log in from a shady workstation and snake through a network; an attacker sets up sneaky inbox rules to maintain access from a phished user.

Are these endpoint or identity attacks? Or are they both?

Untangling endpoint attacks from identity breaches isn't always simple: as attackers pivot from targeting devices to exploiting the identities driving your business, understanding how the two are interconnected is non-negotiable.

  1. Scott Bekker

    Host Scott Bekker Webinar Moderator Future B2B

  2. James Mason

    Featuring James Mason Product Marketing Manager Huntress

  3. Erin Meyers

    Featuring Erin Meyers Principal Product Marketing Manager Huntress

What You'll Learn

  1. The endpoint and identity attack surfaces: what they are, what the unique risks are for both, and why they matter.
  2. Real-world tradecraft used to exploit endpoints and identities.
  3. Why pairing endpoint and identity protection is critical for a rock-solid security posture.