Webcasts


Upcoming

Microsoft Ignite 2024: Top Announcements and Takeaways

Join our experts as they cover the top announcements and innovations that will shape the future of Microsoft’s ecosystem, from major updates in Azure and AI capabilities to advancements in developer tools and security.

Date: 12/10/2024

Time: 9:00 AM


Year-End Multicloud Security Check: The Top Threats to Your Multicloud in 2025 Summit

Don’t let your guard down! Register for this free summit to hear our panel of top independent experts share the biggest security trends affecting the multicloud today, the quickest ways to secure your cloud data against attacks, road-tested multicloud best practices, and the newest tools available to ensure your multicloud environment doesn’t get compromised.

Date: 12/13/2024

Time: 9:00 am


On Demand

Defense-in-Depth 101 Summit: Trends, Strategies and Best Practices IT Teams Need To Know

Discover the keys to a stronger cybersecurity strategy at the Defense-in-Depth 101 Summit. Learn how to adopt a sustainable, multi-layered defense that keeps attackers out and your organization secure. Don’t miss expert insights, practical tips, and best practices—register now!


Prepare for an AI-Powered World with Microsoft Azure

To harness AI’s full potential, enterprises require a robust and secure infrastructure. Microsoft Azure provides a dedicated cloud AI platform equipped with pre-trained models, scalable compute capabilities, and comprehensive data management services. Join in to learn more.


Shutting Down Session Hijacking and Credential Theft

Cybercriminals are constantly finding new ways to hack into Microsoft 365 accounts. In 2023, valid credential abuse was the top method used for initial access, accounting for 30% of incidents. Session hijacking vulnerabilities were identified in 15% of all security misconfigurations. Huntress is dedicated to providing you with the tools you need to combat today’s adversaries.


Back to School with Huntress Managed EDR

This webinar is designed for IT professionals, cybersecurity teams, and organizational leaders who are looking to enhance their endpoint security posture. Whether you are new to EDR or seeking to optimize your current strategy, this session will provide valuable insights into how Huntress Managed EDR can safeguard your environment.


That Phishy Feeling: Learning to Spot Modern Phishing

Your business’ security is only as strong as its weakest link, and more often than not, that weakest link is actually your people. According to Verizon's 2023 Data Breach Investigations Report, 74% of all data breaches involved people - well-meaning users, who accidentally clicked on a malicious link, inadvertently shared a password, or fell victim to social engineering.


Solving the SIEM Problem: A Hard Reset on Legacy Solutions

Every day, we’re bombarded by massive amounts of information. From daily news and stocks, to the latest box scores, keeping up with it all is a full-time job. Your IT infrastructure is no different. Millions of logs circulate through your IT systems, including firewall data, system logs, and endpoint events to name a few.


Account Takeover: What it Is, Why it Matters, and How to Prevent It

Check out this Huntress webinar for a live demonstration and behind-the-scenes look at Huntress Managed Detection and Response (MDR) for Microsoft 365.


An Insider's Guide to Choosing an EDR

Are you in the market for an EDR solution? Have you thought about having it managed by an MDR provider? Are all of these abbreviations very confusing? We don’t blame you—in the world of cybersecurity, there are way too many terms you’re expected to know without much explanation. In this session, learn about the pros and cons of different EDR and MDR solutions for those without a ton of technical experience. This advice is for anyone looking for a new EDR or MDR, but is made specifically for non-experts, so you can make the best choice for your organization whether you’re a seasoned pro or not.


A Look at Group Policy Attack Paths

In today’s technological landscape, Active Directory (AD) is a constant attack point for attackers. A common vector of attack against Active Directory is via group policy. Group policy can be used as a very effective direct or indirect method of executing remote code, modifying security settings, changing user permissions, and much more.


Ransomware Recovery Summit: What To Do After an Attack

In this free, three-hour summit, our experts will outline the steps you need to take in the aftermath of an attack, how to recover your data, and the changes you need to implement to make sure it doesn’t happen again.


Cloud Desktop Resilience Blueprint: Expert Insights and Strategies

Don’t navigate this complex landscape alone! Join this free, three-hour summit to learn from experts about the common pitfalls in managing cloud desktops, the best practices for enhancing resilience in Azure environments, and strategies to keep your organization ahead of emerging threats.


Data & Data Center Strategies for AI Era Summit

Join us to optimize your infrastructure for the AI era. AI is everywhere, profoundly impacting data management and data center infrastructure. Join our free virtual summit to learn from experts how to meet the new demands of AI applications.


Making Generative AI Work: Practical Applications of GenAI in Everyday Business

Join our expert-led webinar series to unlock the potential of generative AI (GenAI) in your organization. You'll dive into real-world use cases, explore how to build custom AI agents, and learn actionable strategies for integrating GenAI into your business operations. Don't miss this opportunity to stay ahead of the curve and transform the way your company leverages AI!