ITDR: The Critical Role of Identity Protection presented by Erin Meyers
Beneath the Surface: Exploring Huntress' Cybersecurity Operations presented by Greg Ake
Cracked the Apple: Unmasking the Mac Infostealer Phenomenon presented by Alden Schmidt
Exploiting the Executive: The Role of Social Engineering and Security Awareness presented by James O'Leary & Wes Hutcherson
Blinded EDR, Now What? New Trends and Pre-Attack Detection presented by Jonathan Johnson
Does Your SIEM Need a Reset? Navigating the Past, Understanding the Present, and Shaping the Future of SIEM presented by Zuri Cortez & Wes Hutcherson
Cybersecurity Heist: The "SlashandGrab" Chronicles presented by John Hammond
Ask Us Anything: Your Questions, Our Insights presented by John Hammond & Chris Bisnett
Does Your SIEM Need a Reset? Navigating the Past, Understanding the Present, and Shaping the Future of SIEM presented by Zuri Cortez & Wes Hutcherson
Platform Confusion: A Peek into macOS APT Spyware presented by Alden Schmidt
Process Injection Detection: Deep Dive into Advanced Telemetry Insights presented by Jonathan Johnson
Underground Cyber Market: Bargains and Bandits on the Dark Web presented by John Hammond
Ride Along: You Just Got Breached presented by Greg Ake
Exploiting the Executive: The Role of Social Engineering and Security Awareness presented by James O'Leary & Wes Hutcherson
Elevate your endpoint, identity, and employee protection with purpose-built, human-led security tools.
Book A Meeting