See The Huntress Managed Security Platform in Action
Ask questions, explore the dashboard and more
Ready to think like a hacker to level up your cybersecurity skills? Join us for hack_it 2021.2 to sharpen your tradecraft, network with security professionals and get hands-on training you can learn today and use in your business tomorrow. Watch the complete virtual event and be a part of the growing hack_it community!
Can you hack_it?
Join us for a series of educational and interactive sessions that will help you better understand bad actors and modern tradecraft. You'll learn from your peers and have plenty of opportunities to network.
With two opportunities to catch the content plus a separate, optional "0-Day" workshop, you've got lots of opportunities to sharpen your skillset.
Click the tabs below to explore 0-Day, Day 1.0 and Day 2.0 content.
October 25, 2021 | 12pm–4pm ET
Optional Session
Cost: $99 USD
When two opposing sides face off, each has its own offensive and defensive tactics in play. The former usually focuses on exploiting your opponent’s weaknesses, while the latter is designed to protect your interests.
As the good guys in the cybersecurity world, we often find ourselves playing defense and reacting to the moves of our opponents... but what if we could bring a bit more offense to the table?
In this half-day session, we’ll dig into both sides of the cybersecurity game. Join us and discover whether defense can actually win championships—or if the best defense is in fact a great offense.
For hack_it 2021.2, we are introducing new content in a modernized virtual environment and updated tactics, techniques and tradecraft.
12:00pm - 1:00pm ET: Dedicated Setup Time
1:00pm - 2:20pm ET: Offense Part 1: Making Hackers Earn Their Access
2:20pm - 2:30pm ET: Break
2:30pm - 3:30pm ET: Offense Part 2: Making Hackers Earn Their Access
3:30pm - 3:40pm ET: Break
3:40pm - 3:45pm ET: Defense: Analyzing Your Network
3:45pm - 4:00pm ET: Wrap-up/Q&A
![]() |
![]() |
Dave Kleinatland Security Researcher Huntress |
John Hammond Senior Security Researcher Huntress |
![]() |
![]() |
Caleb Stewart Security Researcher Huntress |
Henry Washburn Sales Engineering Manager Huntress |
![]() |
![]() |
Jason Phelps MSP Sales Engineer Huntress |
Todd Painter Senior Security Engineer Huntress |
October 26
![]() |
![]() |
John Hammond Huntress |
Kyle Hanslovan Huntress |
![]() |
![]() |
Kyle Hanslovan Huntress |
Lisa Mitchell Netgain Technologies |
Threat actors, ransomware gangs, malware authors and all kinds of shady fellas lurk in the dark web. Do you lurk there too?
In this spooky fireside chat, members of the Huntress team and industry leaders tell their own real-life ghost stories—finding evidence of breaches, data leaks, and tracking down bad guys on the dark web. Join us to uncover what’s really lurking in the shadows and how you can be better informed on the underground enterprise and black market businesses where cybercriminals run amok.
![]() |
![]() |
![]() |
Dave Kleinatland Huntress |
Chris Loehr CFC Response/ Solis Security |
Felicia King Quality Plus Consulting |
So you want to test your organization’s response to phishing campaigns—for all the right reasons, of course! Want to know how hackers prepare the most effective payload?
Join Huntress hackers and members of the MSP community in this technical presentation, showcasing not only how you can set up your own internal phishing campaign, but how bad actors bait businesses with macro-enabled office documents.
![]() |
![]() |
John Hammond Huntress |
Jason Slagle CNWR, Inc. |
![]() |
![]() |
John Hammond Huntress |
Kyle Hanslovan Huntress |
October 27
![]() |
![]() |
John Hammond Huntress |
Kyle Hanslovan Huntress |
It’s not a matter of if, but a matter of when it’s your turn to say, “We’ve been hacked!” But who did the crime? Was it APT123? Ransomware gang XYZ? Together, we will follow the breadcrumbs and put the puzzle pieces together!
Jump into a choose-your-own-adventure, noir-style detective game to solve a malware mystery with the Huntress team and fellow MSP members. We will walk through a theoretical scenario and educate on real-world threat actors and hacker tradecraft. You as the audience can help us track down whodunnit and solve this cybercrime of Clue!
![]() |
![]() |
Kyle Hanslovan Huntress |
Lisa Mitchell Netgain Technologies |
You’ve seen the dumps from the dark web—but what is real, and what is FUD? Members of the Huntress team and fellow MSP members will get shady and explore messaging from different threat actors, ransomware gangs and malware authors.
Join us as we walk the wire examining evidence of compromised organizations and what we could learn to track down the threat actors. This session will be “gamified” as the cohort polls the audience—are these hacks real? We will go on some underground escapades, hunt for hackers and tip-toe through the tulips in the dark web.
![]() |
![]() |
![]() |
Dave Kleinatland Huntress |
Chris Loehr CFC Response/ Solis Security |
Felicia King Quality Plus Consulting |
Team members and personnel know now to hover over the link in an email, or to look for the HTTPS or an official domain so they aren’t a victim of spear phishing… but are those cheesy tricks all that the hackers have up their sleeves?
In this technical session, we will walk through not only how you can prepare your own internal phishing exercise but how you can cook up some mean macro-enabled malware and phish like the pros. This demo-driven presentation—and knowing that a strong offense is the best defense—will show just how hackers trick your IT staff with the ol’ hook, line and sinker!
![]() |
![]() |
John Hammond Huntress |
Jason Slagle CNWR, Inc. |
![]() |
![]() |
John Hammond Huntress |
Kyle Hanslovan Huntress |
Hackers are constantly evolving, exploiting new vulnerabilities and dwelling in SMB environments—until they meet Huntress.