Zero Trust and the Power of Isolation f...
With the growing threat of cyber attacks, DHS’s Cybersecurity and Infrastructure Agency (CISA) and the White House have recently released guidelines for agencies to adopt a Zero Trust approach to cybersecurity. Isolation is paramount to Zero Trust Architecture. Isolation creates a virtual "air gap" between the network end user and the online world. Instead of opening a website directly, the end user sees a sanitized version of it with al...
Dynatrace Perform
Learn here, innovate everywhere, with the industry’s best Hands-on Training (HoT) sessions and available Dynatrace Certification attempts, exclusively at our live event in Las Vegas. You’ll get answers and insights directly from our instructors, and grow your expertise across topics like: Cloud observability AIOps DevOps and DevSecOps Application security Join us for four days of insights and innovation. Watch inspiring keynotes, c...
February 7-10, 2022
Organizer:
Dynatrace Location:
Virtual
2021 Cyber Year in Review & 2022 Predictions
While adversaries continued their malicious activities during the COVID-19 pandemic, the trend line maintained its growing trajectory throughout 2021. Adversaries demonstrated continued growth in intrusion campaigns, eCrime, and other malicious activity that continually challenged cybersecurity personnel across the globe. Attend this session to hear insights from CrowdStrike’s leading experts as they reflect on 2021, discuss potential tr...
Connect-the-Dots Between Today and a Ze...
First defined over two decades ago, zero trust has substantially picked up steam in recent years. President Biden’s Executive Order on Improving the Nation’s Cybersecurity has taken it a step further by codifying zero trust as the Federal Government’s security architecture of choice. Nearly every agency desires to achieve zero trust, but the gap between their existing environments and the ideals they read about leave most st...
CrowdStrike Tech Talks-Security and Com...
Join the September Tech Talk and learn more about how to omply with critical security requirements. CrowdStrike and AWS can aid your compliance efforts with continuous monitoring to help ensure you meet security and compliance standards for education, healthcare, government, and beyond. Inherit the latest security controls operated by AWS, strengthening your own compliance and certification programs. Join this webinar and learn how...
Nation-State Threat Landscape Overview: Iran
This brief will cover the current geopolitical climate with Iran and how the current climate is influencing cyber operations from the Iranian regime. It will contain an overview of malicious cyber threat actors, their associated malware, infrastructure, and TTPs, as well as mitigation strategies to ensure your enterprise is protected.
CrowdStrike Tech Talk - Zero Trust
CrowdStrike Tech Talk Tuesday continues as we dive into the Falcon platform with complementary partners and technologies. We've covered threat hunting, threat intelligence for reconnaissance, PS, and more.
Getting Ahead of the Ransomware Operati...
The purpose of this session is to discuss CrowdStrike’s most current understanding regarding the ever-prevalent ransomware threat, and to characterize observations around how the ransomware ecosystem has evolved over the last couple years. Attendees of this session will benefit from CrowdStrike’s unique insights into the associated enablers of ransomware, to include associated initial access techniques, ransomware-related business...
Adopting a Reference Architecture for C...
For companies in the U.S. Defense Industrial Base, CMMC represents a major change in how to think about security and compliance. As business leaders and IT professionals prepare to have their networks and cybersecurity practices assessed and certified, many are forced to confront obstacles including technical debt and long project timelines. In this webinar, participants will learn:• How adopting a reference architecture can accelerate th...
Digital Risk Reconnaissance Across the...
Organizations face a myriad of risks brought about by the digital transformation of their business. These risks include digital fraud, data theft exposure, social media impersonations and phishing attempts within social media and the hidden areas of the open, deep and dark web.Join CrowdStrike's upcoming Tech Talk as they go over CrowdStrike Falcon X Recon™, created to expose the criminal underground and enable organizations to better pr...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.