Your traditional security isn’t stopping today’s attacks.
Here’s what will.
The Problem Every NZ Business Faces
Your business has antivirus software. You have firewalls. You’ve implemented email filtering. Yet cybercriminals are increasingly successful at bypassing these traditional defences using sophisticated techniques that don’t trigger conventional security alerts.
The uncomfortable truth? Most modern breaches happen despite having security measures in place. Attackers aren’t breaking down your doors—they’re stealing legitimate credentials and walking right through them.
Understanding Managed Detection and Response (MDR)
- Why assuming threats will get past your defences is smarter than assuming they won’t
- How continuous monitoring and expert threat hunting catch what traditional security misses
- The difference between having security tools and having someone watching them 24/7
- Real-world example: How rapid detection prevents ransomware from spreading
Understanding Identity Threat Detection and Response (ITDR)
- Why 80% of breaches now involve compromised credentials, not technical exploits
- How attackers use legitimate accounts to move through your systems undetected
- What makes identity systems uniquely vulnerable and why they need specialized protection
- The attack patterns ITDR stops: credential theft, privilege escalation, lateral movement
Webinar Summary
Overview of Threat Landscape and Targeted Industries: Sean Stitt from Huntress and Bill discussed the evolving cyber threat landscape, highlighting the most targeted industries in APAC and globally, with Scott facilitating the session and referencing recent incidents and statistics.
AI-Driven Phishing and Social Engineering Attacks: Sean detailed how threat actors are leveraging AI to create sophisticated phishing campaigns, personalize attacks, and bypass traditional email filters, with Bill and Scott discussing real-world impacts and the importance of user vigilance
Microsoft 365 Credential Theft and Session Hijacking Demonstration: Sean demonstrated a live attack using Evil Jinx to show how attackers can steal Microsoft 365 credentials and session tokens, bypassing MFA, and explained how Huntress detects and responds to such incidents, with Bill and Scott asking clarifying questions.
Best Practices for Cybersecurity Hygiene: Sean provided actionable advice on password management, QR code safety, and general vigilance, with Bill and Scott reinforcing the importance of these practices for both personal and business security.
Deployment and Support of Huntress Security Services: Bill and Sean outlined the deployment of Huntress security services across Kinetics’ client base, including 24/7 Microsoft 365 monitoring and endpoint agents, and invited participants to reach out for further support or questions

