Glitch effectGlitch effect

Meet the Huntress Team

See what you can do with the combination of human-led threat intelligence and purpose-built automation. We’ll be at booth #1843 at the Moscone South Expo—schedule your meeting now or stop by the booth.

Discover the true cost of a cyberattack

The financial impact of cyberattacks is often forgotten, but mid-sized businesses can easily spend $250k+ to fully recover from one. Read our eBook, The True Cost of a Cyberattack, to learn the hidden cost of attacks, and what you can do to avoid learning firsthand.

Download the eBook
RSA - True Cost of a Cyber Attack eBook
RSA EDR Product Images

Expert-led security for endpoints, identities, and employees

The fully managed security platform that combines expert-led threat intelligence and purpose-built technology for businesses of any size.

See the Platform

Huntress Booth Events

We're hosting booth theater sessions with our Huntress team. Please join us for these informative events.

Monday, May 6

5:45 - 6:00 PM: Beneath the Surface: Exploring Huntress' Cybersecurity Operations presented by Greg Ake

6:15 - 6:30 PM: Stay Sharp, Stay Safe - Don't Get Hooked By Phishing presented by Dima Kumets

6:00 - 7:00 PM: Ask Us Anything: Your Questions, Our Insights presented by John Hammond, Matt Kiely, Chris Bisnett, moderated by Henry Washburn

Tuesday, May 7

11:00-11:15 AM: Beneath the Surface: Exploring Huntress' Cybersecurity Operations presented by Greg Ake

11:30-11:45 AM: Stay Sharp, Stay Safe - Don't Get Hooked By Phishing presented by Dima Kumets

1:00-1:15 PM: Mac Menace: The State of macOS Malware and Threats presented by Alden Schmidt

1:30-1:45 PM: Stopping mac Hacks In Their Tracks: An Overview of the macOS Landscape and Rising Tide of Threats presented by Wes Hutcherson

2:00-2:15 PM: Ride Along: You Just Got Breached presented by Greg Ake

3:00-3:15 PM: You Can't Protect What You Can't See: Selecting CTEM for YOUR Attack Surface presented by Wes Hutcherson

3:30-3:45 PM: Cracked the Apple: Unmasking the Mac Infostealer Phenomenon presented by Alden Schmidt

4:00-4:15 PM: Identity Crisis: Combating Microsoft 365 Account Takeovers presented by Matt Kiely

5:00-5:15 PM: Cybersecurity Heist: The Slash and Grab Chronicles presented by John Hammond

5:15-5:45 PM: Ask Us Anything: Your Questions, Our Insights presented by John Hammond, Matt Kiely, Chris Bisnett, moderated by Wes Hutcherson

Wednesday, May 8

11:00-11:15 AM: Beneath the Surface: Exploring Huntress' Cybersecurity Operations presented by Greg Ake

11:30-11:45 AM: Beyond the Firewall: A Peek into APT Malware Mayhem presented by Alden Schmidt

1:00-1:15 PM: Calculating the Confusing: Determining ROI for MDR presented by Wes Hutcherson

2:00-2:15 PM: Underground Cyber Market: Bargains and Bandits on the Dark Web presented by John Hammond

3:00-3:15 PM: Identity Crisis: Combating Microsoft 365 Account Takeovers presented by Matt Keily

4:00-4:15 PM: Ride Along: You Just Got Breached presented by Greg Ake

5:00-5:30 PM: Ask Us Anything: Your Questions, Our Insights presented by John Hammond, Matt Kiely, Chris Bisnett, moderated by Wes Hutcherson

Thursday, May 9

11:00-11:15 AM: Beneath the Surface: Exploring Huntress' Cybersecurity Operations presented by Greg Ake

11:30-11:45 AM: Stay Sharp, Stay Safe - Don't Get Hooked By Phishing presented by Dima Kumets

Glitch effectGlitch effectBlurry glitch effect
Glitch effectGlitch effectBlue ellipse

See what’s possible on the Huntress platform

Elevate your endpoint, identity, and employee protection with purpose-built, human-led security tools. Book your meeting with the Huntress team at RSAC™ 2024 to see how.

Book Your Meeting
RSA San Francisco