Nation-State Threat Landscape Overview: Iran
This brief will cover the current geopolitical climate with Iran and how the current climate is influencing cyber operations from the Iranian regime. It will contain an overview of malicious cyber threat actors, their associated malware, infrastructure, and TTPs, as well as mitigation strategies to ensure your enterprise is protected.
Crowdstrike Threat Hunting Workshop
We’re excited to invite you to the CrowdStrike Threat Hunting Workshop, a virtual practical workshop experience with CrowdStrike, where you will learn the key concepts in building a successful Threat Hunting practice. Whether you are a SOC manager or a threat analyst, you will gain a better understanding of how organisations like yours are using hunting to identify threats proactively. You will also receive the latest insights into build...
Fal.Con for Public Sector 2021
The cyber landscape is more complex than ever because life in the age of COVID is more complex.We work from an office, kitchen table or car, using multiple mobile devices, both work and personal. We connect to applications that reside inside our organization or in the cloud. We are always on – but so are our adversaries.The recent Cybersecurity Executive Order calls on agencies to move to the cloud while accelerating zero trust. Embrace...
July 21-22, 2021
Organizer:
CrowdStrike Location:
Virtual
Adopting a Reference Architecture for C...
For companies in the U.S. Defense Industrial Base, CMMC represents a major change in how to think about security and compliance. As business leaders and IT professionals prepare to have their networks and cybersecurity practices assessed and certified, many are forced to confront obstacles including technical debt and long project timelines. In this webinar, participants will learn:• How adopting a reference architecture can accelerate th...
Digital Risk Reconnaissance Across the...
Organizations face a myriad of risks brought about by the digital transformation of their business. These risks include digital fraud, data theft exposure, social media impersonations and phishing attempts within social media and the hidden areas of the open, deep and dark web.Join CrowdStrike's upcoming Tech Talk as they go over CrowdStrike Falcon X Recon™, created to expose the criminal underground and enable organizations to better pr...
Understanding the Primary Drivers and C...
This briefing will cover the Big 4 nation-state threat actors, which are Russia, China, Iran, and North Korea. We will discuss how these nations have evolved their offensive cyber capabilities over the last year, how they have shifted (or maintained) their targeting objectives, as well as how the 4 have affected different industries across the commercial and government sectors.
Crowdstrike | AWS Security Dev Day
You are invited to a Cloud Security Dev Day live virtual workshop with CrowdStrike and AWS! Join CrowdStrike and AWS for new insights and perspectives on the tactics and techniques in use by today's adversaries. You will see new developments that highlight the dynamic nature of the cybersecurity threats, and have a chance to roll up your sleeves and go HANDS-ON with the Falcon Platform to practice your own hunting and investigation techniques....
Crowdstrike | AWS Security Dev Day
You are invited to a Cloud Security Dev Day live virtual workshop with CrowdStrike and AWS! Join CrowdStrike and AWS for new insights and perspectives on the tactics and techniques in use by today's adversaries. You will see new developments that highlight the dynamic nature of the cybersecurity threats, and have a chance to roll up your sleeves and go HANDS-ON with the Falcon Platform to practice your own hunting and investigation techniques....
Identity Protection and Zero Trust
While companies have embraced more endpoint and multifactor authentication (MFA) solutions in their security architecture, they don’t always see incidents as they happen — especially those involving service accounts and lateral movement. Recent attacks targeting identity and supply chain automation have made it clear that the next level of preparedness and risk mitigation must include reviewing and strengthening identity security t...
Crowdstrike | AWS Security Dev Day
You are invited to a Cloud Security Dev Day live virtual workshop with CrowdStrike and AWS! Join CrowdStrike and AWS for new insights and perspectives on the tactics and techniques in use by today's adversaries. You will see new developments that highlight the dynamic nature of the cybersecurity threats, and have a chance to roll up your sleeves and go HANDS-ON with the Falcon Platform to practice your own hunting and investigation techniques....
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.