• Home
  • Sponsored By Huntress
Decoding Compliance and Cyber Insurance: From Mandates to Clarity

Decoding Compliance and Cyber Insurance: From Mandates to Cl...

No one ever said cyber security was easy. Waves of high-profile data breaches that hit home, from we...
Solving the SIEM Problem: A Hard Reset on Legacy Solutions

Solving the SIEM Problem: A Hard Reset on Legacy Solutions

If you're frustrated by a SIEM solution that fails to make sense of the countless security and event...
How to Implement a Security Awareness Program That Works

How to Implement a Security Awareness Program That Works

Huntress cybersecurity expert Dima Kumets will share tips for building an effective security culture...
Account Takeover: What it Is, Why it Matters, and How to Prevent It

Account Takeover: What it Is, Why it Matters, and How to Pre...

Take a 20-minute deep dive into the growing prevalence of Account Takeover (ATO) attacks—and disco...
An Insider’s (Non-Technical) Guide to Choosing an EDR & MDR

An Insider’s (Non-Technical) Guide to Choosing an EDR &...

Specifically tailored to non-experts, this straightforward session explains the pros and cons of dif...