Glitch effect

Building a Threat-Informed Security Program Using the Cyber Defense Matrix

Join Sounil and Garrett Gross of Huntress to dive into how to understand and apply the Cyber Defense Matrix.

Glitch effectGlitch effect
Watch the Webinar
By submitting this form, you accept our Terms of Service & Privacy Policy
Oops! Something went wrong while submitting the form.

The proliferation of security tools and solutions has exploded over the past years. Costly ransomware and supply chain attacks have placed significant losses on insurance companies resulting in massive premium increases and in many cases, large reductions in coverage limits.  Cyber insurance questionnaires have become the unregulated “regulator” leaving many businesses and MSPs wondering, do I have the “right” security controls and processes in place?

Sounil Yu has built a model, the Cyber Defense Matrix, that helps to answer that essential question; do I have gaps in my security stack and how can I easily spot what they are?

Join Sounil and Garrett Gross of Huntress to dive into how to understand and apply the Cyber Defense Matrix. During this webinar you will learn:

  • What threats face small and mid-market businesses today
  • How to approach building a security program that addresses the most common ways threat actors attack
  • How the Cyber Defense Matrix helps you understand your current capabilities and identify gaps so you can fortify your defenses

Garrett Gross
‎Head of Product Management
LinkedIn icon
Sounil Yu
CISO & Head of Research, Jupiter One, Creator of the Cyber Defense Matrix

[PH] Learn More About Phishing

[PH] Huntress delivers everything you want from a security tool, all designed with the unique needs of outsourced IT and security teams in mind.
[PH] Phishing attempts can show up as messages from your bank, your boss, your utility providers, or even the government. One click from one user can compromise an entire network and inadvertently let hackers deploy ransomware, steal information, or worse.
[PH] The median time it takes for a user to click a link and enter information is less than 60 seconds. With a turnaround time that quick, it's no wonder phishing is one of the preferred methods used by hackers. (2024 Verizon Data Breach Report)
Glitch effectGlitch effectBlurry glitch effect