Tech Talk: All the Fixings with Identit...
Just like the best holiday meals, our shared partnerships and technologies come together for a complete offering. Join the December Tech Talk as we showcase how CrowdStrike and Okta combine best-in-class solutions for identity management and endpoint security. This partnership simplifies remote access for trusted users and devices, centralizes visibility, and supplies critical user and device context to access requests. You get the data-driven...
Tech Talk: All the Fixings with Identit...
Just like the best Thanksgiving meals, our shared partnerships and technologies come together for a complete offering. Join the November Tech Talk Tuesday as we showcase how CrowdStrike and Okta combine best-in-class solutions for identity management and endpoint security. This partnership simplifies remote access for trusted users and devices, centralizes visibility, and supplies critical user and device context to access requests. You get th...
eCrime Social Engineering Operations
eCrime actors have continually sought to capitalize on current events, human emotion, and sensitive data to manipulate real human behaviors as part of a cyber attack. This brief will cover the necessary circumstances and infrastructure used in recent social engineering techniques to lure past victims – including public sector and educational institutions – into providing information or performing actions that support financially-mo...
FAL.CON 2021
Join us and thousands of your peers from around the globe for CrowdStrike 5th Annual Cybersecurity Conference, Fal.Con 2021! During this 3-day virtual experience, you’ll hear from leading cybersecurity professionals and industry experts, gain insights into the latest in threat intelligence, identity protection and cloud security across 40+ learnings sessions, and discover new ways to maximize the power of the CrowdStrike Falcon® plat...
October 12-14, 2021
Organizer:
CrowdStrike Location:
Virtual
CrowdStrike Tech Talks-Security and Com...
Join the September Tech Talk and learn more about how to omply with critical security requirements. CrowdStrike and AWS can aid your compliance efforts with continuous monitoring to help ensure you meet security and compliance standards for education, healthcare, government, and beyond. Inherit the latest security controls operated by AWS, strengthening your own compliance and certification programs. Join this webinar and learn how...
Nation-State Threat Landscape Overview: Iran
This brief will cover the current geopolitical climate with Iran and how the current climate is influencing cyber operations from the Iranian regime. It will contain an overview of malicious cyber threat actors, their associated malware, infrastructure, and TTPs, as well as mitigation strategies to ensure your enterprise is protected.
Crowdstrike Threat Hunting Workshop
We’re excited to invite you to the CrowdStrike Threat Hunting Workshop, a virtual practical workshop experience with CrowdStrike, where you will learn the key concepts in building a successful Threat Hunting practice. Whether you are a SOC manager or a threat analyst, you will gain a better understanding of how organisations like yours are using hunting to identify threats proactively. You will also receive the latest insights into build...
Fal.Con for Public Sector 2021
The cyber landscape is more complex than ever because life in the age of COVID is more complex.We work from an office, kitchen table or car, using multiple mobile devices, both work and personal. We connect to applications that reside inside our organization or in the cloud. We are always on – but so are our adversaries.The recent Cybersecurity Executive Order calls on agencies to move to the cloud while accelerating zero trust. Embrace...
July 21-22, 2021
Organizer:
CrowdStrike Location:
Virtual
Adopting a Reference Architecture for C...
For companies in the U.S. Defense Industrial Base, CMMC represents a major change in how to think about security and compliance. As business leaders and IT professionals prepare to have their networks and cybersecurity practices assessed and certified, many are forced to confront obstacles including technical debt and long project timelines. In this webinar, participants will learn:• How adopting a reference architecture can accelerate th...
Digital Risk Reconnaissance Across the...
Organizations face a myriad of risks brought about by the digital transformation of their business. These risks include digital fraud, data theft exposure, social media impersonations and phishing attempts within social media and the hidden areas of the open, deep and dark web.Join CrowdStrike's upcoming Tech Talk as they go over CrowdStrike Falcon X Recon™, created to expose the criminal underground and enable organizations to better pr...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.