Nation-State Threat Landscape Overview: Iran
This brief will cover the current geopolitical climate with Iran and how the current climate is influencing cyber operations from the Iranian regime. It will contain an overview of malicious cyber threat actors, their associated malware, infrastructure, and TTPs, as well as mitigation strategies to ensure your enterprise is protected.
CrowdStrike Tech Talk - Zero Trust
CrowdStrike Tech Talk Tuesday continues as we dive into the Falcon platform with complementary partners and technologies. We've covered threat hunting, threat intelligence for reconnaissance, PS, and more.
Getting Ahead of the Ransomware Operati...
The purpose of this session is to discuss CrowdStrike’s most current understanding regarding the ever-prevalent ransomware threat, and to characterize observations around how the ransomware ecosystem has evolved over the last couple years. Attendees of this session will benefit from CrowdStrike’s unique insights into the associated enablers of ransomware, to include associated initial access techniques, ransomware-related business...
Adopting a Reference Architecture for C...
For companies in the U.S. Defense Industrial Base, CMMC represents a major change in how to think about security and compliance. As business leaders and IT professionals prepare to have their networks and cybersecurity practices assessed and certified, many are forced to confront obstacles including technical debt and long project timelines. In this webinar, participants will learn:• How adopting a reference architecture can accelerate th...
Digital Risk Reconnaissance Across the...
Organizations face a myriad of risks brought about by the digital transformation of their business. These risks include digital fraud, data theft exposure, social media impersonations and phishing attempts within social media and the hidden areas of the open, deep and dark web.Join CrowdStrike's upcoming Tech Talk as they go over CrowdStrike Falcon X Recon™, created to expose the criminal underground and enable organizations to better pr...
Understanding the Primary Drivers and C...
This briefing will cover the Big 4 nation-state threat actors, which are Russia, China, Iran, and North Korea. We will discuss how these nations have evolved their offensive cyber capabilities over the last year, how they have shifted (or maintained) their targeting objectives, as well as how the 4 have affected different industries across the commercial and government sectors.
Identity Protection and Zero Trust
While companies have embraced more endpoint and multifactor authentication (MFA) solutions in their security architecture, they don’t always see incidents as they happen — especially those involving service accounts and lateral movement. Recent attacks targeting identity and supply chain automation have made it clear that the next level of preparedness and risk mitigation must include reviewing and strengthening identity security t...
Emerging Threat: Access Brokers ...
Over the last year, CrowdStrike has observed the emergence of malicious threat actor entities who are selling access into target environments. This access often pertains directly to the target’s network environment, to include the sale of login credentials, RDP login data, domain admin credentials, and more. Of note, CrowdStrike has specifically observed a surge in access broker targeting of state and federal government entities, which m...
CMMC Assessment: Sneak Peek at the Final Exam
Cybersecurity Maturity Model Certification (CMMC) requirements are beginning to appear in DoD contracts now and will be a mandatory requirement in all DoD contracts by FY26. The time to prepare is now to attain “Maturity” in CMMC. Join our panel of registered practitioners and C3PAO experts, as they share their first-hand experiences in preparing for their own organizations’ CMMC requirements, and therefore preparing for the...
Delivering the SOC Visibility Triad
According to Gartner, “the escalating sophistication of threats requires organizations touse multiple sources of data for threat detection and responses. Network-basedtechnologies enable technical professionals to obtain quick threat visibility across anentire environment...” Historically, security efforts have focused on the perimeter. With recent supply chainattacks, renewed focus on the interior threat surface necessitates impro...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.