
On-Demand Webinar
February 27, 2025
Lateral Movement to Credential Theft: How Endpoint and Identities are Interconnected



Topics Covered
Endpoint Detection and Response
Business Email Compromise
Attacker Tradecraft
See Huntress in action
Our platform combines a suite of powerful managed detection and response tools for endpoints and Microsoft 365 identities, science-backed security awareness training, and the expertise of our 24/7 Security Operations Center (SOC).
