Someone From Huntress
IT Cybersecurity and Risk Manager
Ring Container Technologies

Part (1) June 2nd 11AM - 12 PM
Layer Up Part 1: Your Base Layers—Identity, Email, and Endpoints
Part (2) June 16th 11AM - 12 PM
Layer Up Part 2: Detection, Response & Resilience—Your Top Layers