Hi [[ session.user.profile.firstName ]]

CrowdStrike

  • Date
  • Rating
  • Views
  • Battling Unknown Malware With Machine Learning Battling Unknown Malware With Machine Learning Dr. Sven Krasser, Chief Scientist, CrowdStrike Recorded: Feb 13 2017 58 mins
    Learn about the first signature-less engine to be integrated into VirusTotal

    CrowdStrike recently made headlines by announcing that it is the first machine learning-based engine to be integrated into VirusTotal. VirusTotal is the premier nexus where all reputable AV vendors transparently publicize their detection results and share malware data for the greater good. The addition of CrowdStrike’s advanced machine learning engine to this anti-malware industry staple is a major leap forward for users who rely on VirusTotal capabilities to help defend their endpoints.

    In this live CrowdCast, CrowdStrike’s Chief Scientist Dr. Sven Krasser offers an exclusive look “under the hood” of this unique machine learning engine, revealing how it works, how it differs from all other signature-based engines integrated into VirusTotal to date, and how it fits into the larger ecosystem of techniques used by CrowdStrike Falcon to keep endpoints and environments safe.

    Topics will include:

    •What CrowdStrike Falcon machine learning is and how it works
    •How to interpret results of machine learning-based threat detection
    •How users can benefit from the CrowdStrike Falcon machine learning engine
    •How this cutting-edge technology fits into the CrowdStrike Falcon breach prevention platform


    Featured Speaker:

    Dr. Sven Krasser
    Chief Scientist, CrowdStrike

    Dr. Sven Krasser is a recognized authority on network and host security. He currently serves as Chief Scientist for CrowdStrike, where he oversees the development of endhost and cloud-based Big Data technologies. Previously, Dr. Krasser was at McAfee where he led the data analysis and classification efforts for TrustedSource. He is the lead inventor of numerous key patented and patent-pending network and host security technologies and is the author of numerous publications on networking and security technologies.
  • Lessons from the Trenches: Cyber Intrusion Casebook Revealed Lessons from the Trenches: Cyber Intrusion Casebook Revealed Wendi Whitmore, VP CrowdStrike Services; Andy Schworer, Principal Consultant; and Brandon Finney, Principal Consultant Recorded: Dec 9 2015 70 mins
    Learn important lessons gleaned from real-life engagements, detailing the tools and techniques advanced attackers use to compromise victim networks, and strategies the CrowdStrike Services team has devised to combat and even prevent these attacks from occurring.

    You will learn:

    - New tactics attackers are using to gain and maintain access to victim networks
    - How quickly adversaries attempt to re-infect an organization
    - Remediation tactics and tools you can use to remove attackers from your network
    - Proactive steps you can take to improve your success in detecting, preventing and responding to targeted attacks
  • Should I Really Trust the Cloud with my Endpoint Security Protection? Should I Really Trust the Cloud with my Endpoint Security Protection? Dave Cole, Chief Product Officer, CrowdStrike Recorded: Nov 11 2015 49 mins
    In architecting true next generation endpoint protection, CrowdStrike made a deliberate decision to embrace the Cloud. Why? The Falcon platform was built by people fed up with the limitations of building on-premise products, who realized that ‘Cloud-supported’ wasn’t enough. Only an endpoint security product designed from the ground-up to be based on the Cloud would work.
    In this session you will learn:
    • Why the Cloud provides the scale, resources and power to protect you
    • The privacy, security, control and legal issues to be considered in using the Cloud for endpoint security
    • Why the Cloud-based Falcon endpoint protection platform is the right decision for your organization.
  • What’s Next in Endpoint Defense? What’s Next in Endpoint Defense? Dmitri Alperovitch, CTO and Cofounder, CrowdStrike; Renee Guttmann, VP for Info Risk, Optiv; Rafal Los, Dir, Sol Researc,Opti Recorded: Oct 30 2015 61 mins
    Join executives from CrowdStrike and Optiv in a lively panel discussion on why signature-focused, alert-centric reactive model for endpoint security tools must evolve to meet the growing productivity needs of the enterprise in an increasingly hostile threat environment. Find out how the next generation in endpoint protection is helping some of the world’s top organizations fill the gaps left by their existing security solutions.
    Join us and you will learn:
    •Why existing leading security strategies barely address 40% of today’s enterprise data breaches.
    •Learn the must-have capabilities and features of a successful endpoint security solution strategy.
    •How one Fortune 100 financial firm deployed an entirely cloud-based NGE solution to radically improve its security posture.
  • Beyond Malware: How to Detect and Respond to Malware-Free Intrusions Beyond Malware: How to Detect and Respond to Malware-Free Intrusions Dmitri Alperovitch, CTO and Cofounder; CrowdStrike and Elia Zaitsev, Principal Solutions Architect; CrowdStrike Recorded: Oct 28 2015 53 mins
    What do you do when adversaries don’t use any malware or exploits? We will show how to deal with malware-free intrusions; how to detect, prevent, attribute and respond. This session will feature techniques we’ve observed in the field, from the stealthiest adversaries who leave no malware footprints behind. We will demonstrate a live attack and show how CrowdStrike’s next-generation endpoint protection solution, Falcon Host, can detect the activity in real-time and provide relevant countermeasures for protection and response.
    In this session, you will learn how to:
    •Determine whether advanced adversaries have gained a foothold in your organization without using malware
    •Identify and observe adversary’s lateral movement to understand what they want and who they are targeting in your organization
    •Gain the ability to record and reconstruct an incident completely to understand what systems and data the adversary has touched
  • The Importance of Achieving True Endpoint Visibility The Importance of Achieving True Endpoint Visibility Elia Zaitsev, CrowdStrike Security Architect Recorded: Oct 19 2015 7 mins
    Learn why true endpoint visibility is so important and what blind spots you may have. We will also show you how Falcon Host provides you with true end-to-end visibility into endpoint activity on your network, allowing you to keep adversaries out of your environment. In this video, CrowdStrike Principal Security Architect Elia Zaitsev demonstrates how Falcon Host eliminates blind spots in your endpoint monitoring, providing you with the speed, scale, detail and context you need to secure your networks against even the most advanced attacks.

Embed in website or blog