Our Latest Threat Matrix Report Is Out! Where we break down the latest threat developments and share what organisations should be preparing for in 2026.
Webinar
Event details:
Attackers are evolving and evading Endpoint Detection and Response (EDR). Join our experts and learn the practical steps required to strengthen this essential layer.
Researchers have just showed how Microsoft Defender’s own kernel driver can be turned into a credential-dumping tool – bypassing LSASS protections without loading any new driver. Would your endpoint detection catch that? And what can you do about it?
EDR is now a cornerstone of endpoint security – but attackers have learned how to work around it. This webinar looks beyond the tool to the tactics, showing how security leaders can close real-world gaps without discarding the investments they already rely on.
Drawing on more than three decades of combined frontline experience, Ian Qvist and Jan Kaastrup will walk through the most common ways adversaries bypass EDR and how layered defences (compromise assessments, MDR, OS), hardware-level controls, and stronger processes can restore the advantage to defenders.
Attendees will gain a clear view of current attacker techniques, understand the practical limitations of EDR, and learn how to reinforce it with complementary controls. You will leave with concrete steps for improving endpoint protection, a checklist for strengthening your security posture, and tested approaches for more effective detection and response – grounded in real cases rather than theory.
Speakers:
Ian Qvist, Director & Endpoint Security and Forensics Expert
Technology expert with more than 15 years of hands-on cybersecurity experience, advising organisations on endpoint security, incident response and operational defence. Ian brings practical insight from real-world compromises and remediation efforts.
Jan Kaastrup, CIO & Cybersecurity Expert
With over 20 years in IT security, Jan’s experience spans network architecture, forensics, incident response, malware research, penetration testing and financial fraud investigations. He is the author of “Usynlig fjende” (An Invisible Enemy) and a recognised voice on modern cyber threats and resilience.
Key takeaways
By attending, you will:
Understand how attackers routinely bypass even well-configured EDR solutions.
Recognise the most common EDR blind spots & vulnerabilities in real environments.
Learn how to strengthen EDR with additional layers such as compromise assessments and MDR.
Gain a practical, step-by-step checklist for hardening endpoint security.
See how to improve proactive detection and response using threat intelligence and behavioral insights.
Take away concrete, immediately actionable measures to improve your organisation’s security posture.
Who it is for
This webinar is designed for:
CISOs and heads of information security.
SOC managers and security operations leaders.
IT and security architects.
Endpoint, infrastructure and technology owners responsible for security outcomes.