Back to Search Begin New Search Save Search Auto-Notify
Digital Risk Reconnaissance Across the...
Organizations face a myriad of risks brought about by the digital transformation of their business. These risks include digital fraud, data theft exposure, social media impersonations and phishing attempts within social media and the hidden areas of the open, deep and dark web.Join CrowdStrike's upcoming Tech Talk as they go over CrowdStrike Falcon X Recon™, created to expose the criminal underground and enable organizations to better pr...
June 15, 2021
Organizer: DLT Solutions
Location: Webcast
Add Favorite
Understanding the Primary Drivers and C...
This briefing will cover the Big 4 nation-state threat actors, which are Russia, China, Iran, and North Korea. We will discuss how these nations have evolved their offensive cyber capabilities over the last year, how they have shifted (or maintained) their targeting objectives, as well as how the 4 have affected different industries across the commercial and government sectors.
June 8, 2021
Organizer: DLT Solutions
Location: Webcast
Add Favorite
Identity Protection and Zero Trust
While companies have embraced more endpoint and multifactor authentication (MFA) solutions in their security architecture, they don’t always see incidents as they happen — especially those involving service accounts and lateral movement. Recent attacks targeting identity and supply chain automation have made it clear that the next level of preparedness and risk mitigation must include reviewing and strengthening identity security t...
May 18, 2021
Organizer: DLT Solutions
Location: Webcast
Add Favorite
Emerging Threat: Access Brokers ...
Over the last year, CrowdStrike has observed the emergence of malicious threat actor entities who are selling access into target environments. This access often pertains directly to the target’s network environment, to include the sale of login credentials, RDP login data, domain admin credentials, and more. Of note, CrowdStrike has specifically observed a surge in access broker targeting of state and federal government entities, which m...
May 11, 2021
Organizer: DLT Solutions
Location: Webcast
Add Favorite
CMMC Assessment: Sneak Peek at the Final Exam
Cybersecurity Maturity Model Certification (CMMC) requirements are beginning to appear in DoD contracts now and will be a mandatory requirement in all DoD contracts by FY26. The time to prepare is now to attain “Maturity” in CMMC. Join our panel of registered practitioners and C3PAO experts, as they share their first-hand experiences in preparing for their own organizations’ CMMC requirements, and therefore preparing for the...
April 28, 2021
Organizer: DLT Solutions
Location: Webcast
Add Favorite
Delivering the SOC Visibility Triad
According to Gartner, “the escalating sophistication of threats requires organizations touse multiple sources of data for threat detection and responses. Network-basedtechnologies enable technical professionals to obtain quick threat visibility across anentire environment...” Historically, security efforts have focused on the perimeter. With recent supply chainattacks, renewed focus on the interior threat surface necessitates impro...
April 20, 2021
Organizer: DLT Solutions
Location: Webcast
Add Favorite
Insights into Adversaries Exploiting On...
Between 27 February through March 2021, CrowdStrike Intelligence observed the exploitation of Microsoft on-prem Exchange servers against dozens of victims. These victims are spread across a number of verticals with a heavy focus on organizations located in North America. CrowdStrike has uncovered at least six China-nexus adversaries and at least one e-Crime actor leveraging access to vulnerable Microsoft Exchange servers during this time frame...
April 13, 2021
Organizer: DLT Solutions
Location: Webcast
Add Favorite
Department of the Navy Oracle II ESLA ...
How Intuitive Analytics Helps You Capitalize on Otherwise Missed Opportunities Join us on Tuesday, April 13th from 1:00 - 2:00 PEM EST for a Department of the Navy Oracle II Enterprise Software License Agreement (ESLA) and Technology Spotlight LIVE webinar hosted on MS Teams featuring Oracle Analytics and Business Intelligence. This webinar will include a brief introduction to DLT Solutions followed by a spotlight on the new era of business an...
April 13, 2021
Organizer: DLT Solutions
Location: Webcast
Add Favorite
Public Sector & Healthcare Debriefs: Ex...
Throughout 2020, ransomware increasingly threatened organizations in every industry worldwide – and the threat continues. In the 2021 Global Threat Report, CrowdStrike outlined a vast, interconnected eCrime ecosystem with criminal adversaries existing to support enterprise ransomware operations. Many of these adversaries specialize and work in concert with each other, combining malicious services, ransomware distribution methods and mone...
March 30, 2021
Organizer: DLT Solutions
Location: Webcast
Add Favorite
Using CrowdStrike for Software Savings
Since CrowdStrike collects a vast amount of benign meta-data, there are many non-security use cases you can tap into such as: Enterprise Software usage across the Organization. Identify unused software licenses aka “shelf-ware” to save money Identifying RPA (Robotic Process Automation) tasks across my users. i.e. finding menial and repetitive tasks end-users do and replace them with bots Finding Insights on Application Issues / Cra...
March 16, 2021
Organizer: DLT Solutions
Location: Webcast
Add Favorite
Back to Search Begin New Search